{"id":"MGASA-2017-0390","summary":"Updated virtualbox packages fix security vulnerabilities","details":"This update provides the virtualbox 5.1.30 maintenance release, fixing\nsecurity and other issues:\n\nIn OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad\nparameters for a DHE or ECDHE key exchange then this can result in\nthe client attempting to dereference a NULL pointer leading to a\nclient crash. This could be exploited in a Denial of Service attack\n(CVE-2017-3730).\n\nOpenSSL is vulnerable to a denial of service, caused by an out-of-bounds\nread when using a specific cipher. By sending specially crafted truncated\npackets, a remote attacker could exploit this vulnerability using\nCHACHA20/POLY1305 to cause the application to crash (CVE-2017-3731).\n\nOpenSSL could allow a remote attacker to obtain sensitive information,\ncaused by a propagation error in the BN_mod_exp() function. An attacker\ncould exploit this vulnerability to obtain information about the private\nkey (CVE-2017-3732).\n\nDuring a renegotiation handshake if the Encrypt-Then-Mac extension is\nnegotiated where it was not in the original handshake (or vice-versa)\nthen this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on\nciphersuite). Both clients and servers are affected (CVE-2017-3733)\n\nA local user can exploit a flaw in the Oracle VM VirtualBox Core component\nto partially access data, partially modify data, and deny service\n(CVE-2017-10392, CVE-2017-10407, CVE-2017-10408).\n\nA local user can exploit a flaw in the Oracle VM VirtualBox Core component\nto partially access data, partially modify data, and partially deny service\n(CVE-2017-10428).\n\nFor other fixes in this update see the referenced changelog.\n","modified":"2026-04-16T01:46:58.762888359Z","published":"2017-10-27T07:16:04Z","upstream":["CVE-2017-10392","CVE-2017-10407","CVE-2017-10408","CVE-2017-10428","CVE-2017-2730","CVE-2017-3731","CVE-2017-3732","CVE-2017-3733"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0390.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21901"},{"type":"WEB","url":"https://www.virtualbox.org/wiki/Changelog-5.1#v30"}],"affected":[{"package":{"name":"virtualbox","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/virtualbox?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.30-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0390.json"}},{"package":{"name":"kmod-vboxadditions","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kmod-vboxadditions?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.30-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0390.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.30-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0390.json"}},{"package":{"name":"virtualbox","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/virtualbox?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.30-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0390.json"}},{"package":{"name":"kmod-vboxadditions","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/kmod-vboxadditions?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.30-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0390.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.30-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0390.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}