CVE-2018-2693

NameCVE-2018-2693
DescriptionVulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Guest Additions). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
virtualbox-guest-additions-iso (PTS)bullseye/non-free6.1.22-1fixed
bookworm/non-free7.0.6-1fixed
trixie/non-free, sid/non-free7.0.20-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
virtualbox-guest-additions-isosource(unstable)5.2.6-1

Notes

[jessie] - virtualbox-guest-additions-iso <no-dsa> (Non-free not supported)
[wheezy] - virtualbox-guest-additions-iso <no-dsa> (Non-free not supported)
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html

Search for package or bug name: Reporting problems