Language:
https://bugzilla.suse.com/1202848
https://bugzilla.suse.com/1215945
https://bugzilla.suse.com/1223070
https://bugzilla.suse.com/1223235
https://bugzilla.suse.com/1223256
https://bugzilla.suse.com/1223272
https://bugzilla.suse.com/1223304
https://bugzilla.suse.com/1223437
https://bugzilla.suse.com/1227296
https://bugzilla.suse.com/1229026
https://bugzilla.suse.com/1229338
https://bugzilla.suse.com/1234028
https://bugzilla.suse.com/1235092
https://bugzilla.suse.com/1236007
https://bugzilla.suse.com/1237351
https://bugzilla.suse.com/1237358
https://bugzilla.suse.com/1237371
https://bugzilla.suse.com/1237382
http://www.nessus.org/u?857e7020
https://www.suse.com/security/cve/CVE-2023-49502
https://www.suse.com/security/cve/CVE-2023-50010
https://www.suse.com/security/cve/CVE-2023-51793
https://www.suse.com/security/cve/CVE-2023-51794
https://www.suse.com/security/cve/CVE-2023-51798
https://www.suse.com/security/cve/CVE-2024-12361
https://www.suse.com/security/cve/CVE-2024-31578
https://www.suse.com/security/cve/CVE-2024-32230
https://www.suse.com/security/cve/CVE-2024-35368
https://www.suse.com/security/cve/CVE-2024-36613
https://www.suse.com/security/cve/CVE-2024-7055
https://www.suse.com/security/cve/CVE-2025-0518
https://www.suse.com/security/cve/CVE-2025-22919
https://www.suse.com/security/cve/CVE-2025-22921
https://www.suse.com/security/cve/CVE-2025-25473
Severity: Medium
ID: 232751
File Name: suse_SU-2025-0862-1.nasl
Version: 1.2
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/15/2025
Updated: 4/25/2025
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2024-7055
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CVSS Score Source: CVE-2024-32230
Risk Factor: Medium
Base Score: 6.9
Threat Score: 5.5
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CPE: p-cpe:/a:novell:suse_linux:libavcodec58_134, p-cpe:/a:novell:suse_linux:ffmpeg-4-private-devel, p-cpe:/a:novell:suse_linux:libavfilter7_110, p-cpe:/a:novell:suse_linux:ffmpeg-4-libavutil-devel, p-cpe:/a:novell:suse_linux:ffmpeg-4, p-cpe:/a:novell:suse_linux:libavutil56_70, p-cpe:/a:novell:suse_linux:libpostproc55_9, p-cpe:/a:novell:suse_linux:ffmpeg-4-libswscale-devel, p-cpe:/a:novell:suse_linux:libswscale5_9, p-cpe:/a:novell:suse_linux:libavformat58_76, p-cpe:/a:novell:suse_linux:libswresample3_9, p-cpe:/a:novell:suse_linux:ffmpeg-4-libavfilter-devel, p-cpe:/a:novell:suse_linux:ffmpeg-4-libavformat-devel, p-cpe:/a:novell:suse_linux:ffmpeg-4-libavdevice-devel, p-cpe:/a:novell:suse_linux:libavresample4_0, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:ffmpeg-4-libavcodec-devel, p-cpe:/a:novell:suse_linux:ffmpeg-4-libswresample-devel, p-cpe:/a:novell:suse_linux:ffmpeg-4-libavresample-devel, p-cpe:/a:novell:suse_linux:ffmpeg-4-libpostproc-devel, p-cpe:/a:novell:suse_linux:libavdevice58_13
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/14/2025
Vulnerability Publication Date: 4/17/2024
CVE: CVE-2023-49502, CVE-2023-50010, CVE-2023-51793, CVE-2023-51794, CVE-2023-51798, CVE-2024-12361, CVE-2024-31578, CVE-2024-32230, CVE-2024-35368, CVE-2024-36613, CVE-2024-7055, CVE-2025-0518, CVE-2025-22919, CVE-2025-22921, CVE-2025-25473
IAVB: 2025-B-0060
SuSE: SUSE-SU-2025:0862-1