First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | >=5.0.0<=5.0.36 | |
Oracle VM VirtualBox | >=5.1.0<=5.1.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3513 has been rated as a difficult to exploit vulnerability that can be leveraged by a high-privileged attacker.
To fix CVE-2017-3513, upgrade Oracle VM VirtualBox to version 5.0.38 or later and 5.1.20 or later.
CVE-2017-3513 affects the Oracle VM VirtualBox component of Oracle Virtualization, specifically versions prior to 5.0.38 and 5.1.20.
CVE-2017-3513 requires a high-privileged attacker with logon access to the infrastructure, thus it is not classified as a remote vulnerability.
Versions prior to Oracle VM VirtualBox 5.0.38 and 5.1.20 are vulnerable to CVE-2017-3513.