Vulnerability Details : CVE-2014-0405
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.4 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-0407.
Exploit prediction scoring system (EPSS) score for CVE-2014-0405
Probability of exploitation activity in the next 30 days: 0.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 31 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0405
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:L/AC:H/Au:S/C:P/I:P/A:P |
1.5
|
6.4
|
NIST |
References for CVE-2014-0405
-
http://www.securityfocus.com/bid/64900
Oracle VM VirtualBox CVE-2014-0405 Local Security Vulnerability
-
http://www.securitytracker.com/id/1029610
Oracle Virtualization Bugs Let Remote and Local Users Access and Modify Data and Deny Service - SecurityTracker
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90370
Oracle VM VirtualBox Core unspecified CVE-2014-0405 Vulnerability Report
-
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
Oracle Critical Patch Update - January 2014Vendor Advisory
-
http://www.securityfocus.com/bid/64758
RETIRED: Oracle January 2014 Critical Patch Update Multiple Vulnerabilities
Products affected by CVE-2014-0405
- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*