CVE-2017-3332
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: VirtualBox SVGA Emulation). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Integrity and Availability impacts).
Vulnerabilidad en el componente Oracle VM VirtualBox de Oracle Virtualization (subcomponente: VirtualBox SVGA Emulation). Versiones compatibles que están afectadas son VirtualBox anterior a 5.0.32 y anterior a 5.1.14. Vulnerabilidad fácilmente explotable permite a un atacante poco privilegiado con inicio de sesión a la infraestructura donde Oracle VM VirtualBox se ejecuta, comprometer Oracle VM VirtualBox. Mientras la vulnerabilidad esté en Oracle VM VirtualBox, los ataques podrían afectar significativamente a productos adicionales. Ataques exitosos de esta vulnerabilidad pueden resultar en una creación no autorizada, borrado o modificación de acceso a datos críticos o a todos los datos accesibles de Oracle VM VirtualBox y capacidad no autorizada para provocar un cuelgue o bloqueo frecuentemente repetible (DOS completo) de Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Impactos de Integridad y Disponibilidad).
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2016-12-06 CVE Reserved
- 2017-01-27 CVE Published
- 2024-10-08 CVE Updated
- 2024-11-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/95599 | Vdb Entry | |
http://www.securitytracker.com/id/1037638 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201702-08 | 2017-07-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Vm Virtualbox Search vendor "Oracle" for product "Vm Virtualbox" | 5.0.30 Search vendor "Oracle" for product "Vm Virtualbox" and version "5.0.30" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Vm Virtualbox Search vendor "Oracle" for product "Vm Virtualbox" | 5.1.12 Search vendor "Oracle" for product "Vm Virtualbox" and version "5.1.12" | - |
Affected
|