First published: Wed Apr 15 2020(Updated: )
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via MLD to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VirtualBox | <5.2.40 | |
Oracle VirtualBox | >=6.0.0<6.0.20 | |
Oracle VirtualBox | >=6.1.0<6.1.6 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2959 has been rated as a high severity vulnerability due to its potential for exploitation by unauthenticated attackers.
To fix CVE-2020-2959, upgrade Oracle VM VirtualBox to version 5.2.40 or later, or to version 6.0.20 or later, or to version 6.1.6 or later.
CVE-2020-2959 affects all versions of Oracle VM VirtualBox prior to 5.2.40, 6.0.20, and 6.1.6, as well as openSUSE Leap 15.1.
Yes, CVE-2020-2959 is easily exploitable by an unauthenticated attacker with network access.
CVE-2020-2959 specifically impacts the Core component of Oracle VM VirtualBox.