Vulnerability Description
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Vm Virtualbox | < 5.2.16 |
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/104764Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041296Third Party AdvisoryVDB Entry
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/104764Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041296Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-3091?
CVE-2018-3091 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows un...
How severe is CVE-2018-3091?
CVE-2018-3091 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3091?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Vm Virtualbox.