<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2013-6838</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2013-6838</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>4</Number>
        <Date>2021-06-16T08:40:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T13:16:39Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-06-16T08:40:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2013-6838</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">An unspecified Enghouse Interactive Professional Services "addon product" in Enghouse Interactive IVR Pro (VIP2000) 9.0.3 (rel903), when using OpenVZ and fallback customization, uses the same SSH private key across different customers' installations, which allows remote attackers to gain privileges by leveraging knowledge of this key.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2014-01/msg00092.html</URL>
      <Description>E-Mail link for openSUSE-SU-2014:0138-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="openSUSE 12.3">
      <Branch Type="Product Name" Name="openSUSE 12.3">
        <FullProductName ProductID="openSUSE 12.3">openSUSE 12.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE 13.1">
      <Branch Type="Product Name" Name="openSUSE 13.1">
        <FullProductName ProductID="openSUSE 13.1">openSUSE 13.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gnumeric-1.12.0-2.4.3">
      <FullProductName ProductID="gnumeric-1.12.0-2.4.3">gnumeric-1.12.0-2.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnumeric-1.12.7-2.5.3">
      <FullProductName ProductID="gnumeric-1.12.7-2.5.3">gnumeric-1.12.7-2.5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnumeric-devel-1.12.0-2.4.3">
      <FullProductName ProductID="gnumeric-devel-1.12.0-2.4.3">gnumeric-devel-1.12.0-2.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnumeric-devel-1.12.7-2.5.3">
      <FullProductName ProductID="gnumeric-devel-1.12.7-2.5.3">gnumeric-devel-1.12.7-2.5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnumeric-lang-1.12.0-2.4.3">
      <FullProductName ProductID="gnumeric-lang-1.12.0-2.4.3">gnumeric-lang-1.12.0-2.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gnumeric-lang-1.12.7-2.5.3">
      <FullProductName ProductID="gnumeric-lang-1.12.7-2.5.3">gnumeric-lang-1.12.7-2.5.3</FullProductName>
    </Branch>
    <Relationship ProductReference="gnumeric-1.12.0-2.4.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 12.3">
      <FullProductName ProductID="openSUSE 12.3:gnumeric-1.12.0-2.4.3">gnumeric-1.12.0-2.4.3 as a component of openSUSE 12.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-debuginfo-1.12.0-2.4.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 12.3">
      <FullProductName ProductID="openSUSE 12.3:gnumeric-debuginfo-1.12.0-2.4.3">gnumeric-debuginfo-1.12.0-2.4.3 as a component of openSUSE 12.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-debugsource-1.12.0-2.4.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 12.3">
      <FullProductName ProductID="openSUSE 12.3:gnumeric-debugsource-1.12.0-2.4.3">gnumeric-debugsource-1.12.0-2.4.3 as a component of openSUSE 12.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-devel-1.12.0-2.4.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 12.3">
      <FullProductName ProductID="openSUSE 12.3:gnumeric-devel-1.12.0-2.4.3">gnumeric-devel-1.12.0-2.4.3 as a component of openSUSE 12.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-lang-1.12.0-2.4.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 12.3">
      <FullProductName ProductID="openSUSE 12.3:gnumeric-lang-1.12.0-2.4.3">gnumeric-lang-1.12.0-2.4.3 as a component of openSUSE 12.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-1.12.7-2.5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.1">
      <FullProductName ProductID="openSUSE 13.1:gnumeric-1.12.7-2.5.3">gnumeric-1.12.7-2.5.3 as a component of openSUSE 13.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-debuginfo-1.12.7-2.5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.1">
      <FullProductName ProductID="openSUSE 13.1:gnumeric-debuginfo-1.12.7-2.5.3">gnumeric-debuginfo-1.12.7-2.5.3 as a component of openSUSE 13.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-debugsource-1.12.7-2.5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.1">
      <FullProductName ProductID="openSUSE 13.1:gnumeric-debugsource-1.12.7-2.5.3">gnumeric-debugsource-1.12.7-2.5.3 as a component of openSUSE 13.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-devel-1.12.7-2.5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.1">
      <FullProductName ProductID="openSUSE 13.1:gnumeric-devel-1.12.7-2.5.3">gnumeric-devel-1.12.7-2.5.3 as a component of openSUSE 13.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gnumeric-lang-1.12.7-2.5.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.1">
      <FullProductName ProductID="openSUSE 13.1:gnumeric-lang-1.12.7-2.5.3">gnumeric-lang-1.12.7-2.5.3 as a component of openSUSE 13.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An unspecified Enghouse Interactive Professional Services "addon product" in Enghouse Interactive IVR Pro (VIP2000) 9.0.3 (rel903), when using OpenVZ and fallback customization, uses the same SSH private key across different customers' installations, which allows remote attackers to gain privileges by leveraging knowledge of this key.</Note>
    </Notes>
    <CVE>CVE-2013-6838</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 12.3:gnumeric-1.12.0-2.4.3</ProductID>
        <ProductID>openSUSE 12.3:gnumeric-debuginfo-1.12.0-2.4.3</ProductID>
        <ProductID>openSUSE 12.3:gnumeric-debugsource-1.12.0-2.4.3</ProductID>
        <ProductID>openSUSE 12.3:gnumeric-devel-1.12.0-2.4.3</ProductID>
        <ProductID>openSUSE 12.3:gnumeric-lang-1.12.0-2.4.3</ProductID>
        <ProductID>openSUSE 13.1:gnumeric-1.12.7-2.5.3</ProductID>
        <ProductID>openSUSE 13.1:gnumeric-debuginfo-1.12.7-2.5.3</ProductID>
        <ProductID>openSUSE 13.1:gnumeric-debugsource-1.12.7-2.5.3</ProductID>
        <ProductID>openSUSE 13.1:gnumeric-devel-1.12.7-2.5.3</ProductID>
        <ProductID>openSUSE 13.1:gnumeric-lang-1.12.7-2.5.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>10</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:C/I:C/A:C</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
