| SUSE Linux Enterprise Server | Number Of NVD | 472 | CRITICAL | 27 | HIGH | 179 | MEDIUM | 215 | LOW | 51 |
| URL | https://www.suse.com/ | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Explanation | Support is normally provided for 10 years after release, with service pack releases ending after about 8 years. After 10 years, extended support is available for a fee, with yearly updates. |
||||||||
| Tag | |||||||||
| No | Type | Name | URL |
|---|---|---|---|
| 1 | https://www.suse.com/lifecycle/ | ||
| 2 | https://www.suse.com/support/policy/ | ||
| 3 | https://www.suse.com/releasenotes/ |
| No | Name | Latest Version | Release date | Initial release | Normal Support | Security Support Service Pack Support |
Extended for a fee |
Critical | High | Medium | Low |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 51 | SUSE Linux Enterprise Server 15 | SUSE Linux Enterprise Server 15 SP5 | May 22, 2023 | July 16, 2018 | July 31, 2028 | July 31, 2031 | 3 | 8 | 2 | 1 | |
| 52 | SUSE Linux Enterprise Server 12 | Service Pack 5 | Dec. 9, 2019 | Oct. 24, 2014 | Oct. 31, 2024 | Oct. 31, 2027 | 18 | 41 | 78 | 9 | |
| 53 | SUSE Linux Enterprise Server 11 | March 24, 2009 | March 31, 2019 | March 31, 2022 | 15 | 149 | 148 | 31 | |||
| 54 | SUSE Linux Enterprise Server 10 | June 17, 2006 | July 31, 2013 | 6 | 104 | 65 | 23 |
| No | CVSS3 CVSS2 |
Level Attach Vector |
Title | CWE | CVE | cpe23Uri | or higher | or less | more than | less than | Update date Published date |
Show Affected | Exploit PoC Search |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 51 |
6.8 5.4 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decry… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13086 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 52 |
6.8 5.4 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13084 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 53 |
8.1 5.8 |
HIGH
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13082 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 54 |
5.3 2.9 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio ran… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13081 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 55 |
5.3 2.9 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13080 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 56 |
5.3 2.9 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio rang… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13079 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 57 |
5.3 2.9 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points … |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13078 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 58 |
6.8 5.4 |
MEDIUM
Adjacent |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, dec… |
CWE-330
Use of Insufficiently Random Values |
CVE-2017-13077 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:10 2017-10-17 |
Show | GitHub Exploit DB Packet Storm | ||||
| 59 |
9.8 7.5 |
CRITICAL
Network |
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. |
CWE-787
Out-of-bounds Write |
CVE-2017-14491 |
cpe:2.3:o:suse:linux_enterprise_server:12:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4 cpe:2.3:o:suse:linux_en… |
2024-11-21 12:12 2017-10-4 |
Show | GitHub Exploit DB Packet Storm | ||||
| 60 |
7.5 5.0 |
HIGH
Network |
The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands. |
CWE-20
Improper Input Validation |
CVE-2015-5194 |
cpe:2.3:o:suse:linux_enterprise_server:11:sp3 cpe:2.3:o:suse:linux_enterprise_server:11:sp2 cpe:2.3:o:suse:linux_… |
2024-11-21 11:32 2017-07-21 |
Show | GitHub Exploit DB Packet Storm |