2 results (0.020 seconds)

CVSS: 2.1EPSS: 0%CPEs: 23EXPL: 0

Unspecified vulnerability in Guest Additions in Sun xVM VirtualBox 1.6.x and 2.0.x before 2.0.12, 2.1.x, and 2.2.x, and Sun VirtualBox before 3.0.10, allows guest OS users to cause a denial of service (memory consumption) on the guest OS via unknown vectors. Vulnerabilidad no especificada en Guest Additions en Sun xVM VirtualBox v1.6.x y v2.0.x anteriores a v2.0.12, v2.1.x, y v2.2.x, y en Sun VirtualBox versiones anteriores a v3.0.10, permite a usuarios del sistema operativo huésped provocar una denegación de servicio (consumo de memoria) en el sistema operativo huésped mediante vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html http://secunia.com/advisories/38420 http://sunsolve.sun.com/search/document.do?assetkey=1-66-271149-1 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 2

The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address. La función VBoxDrvNtDeviceControl del archivo VBoxDrv.sys de Sun xVM VirtualBox en versiones anteriores a la 1.6.4, utiliza el método de comunicación METHOD_NEITHER para IOCTLs, que no validad adecuadamente el búfer asociado con el objeto Irp, el cual permite a los usuario locales ganar privilegios abriendo el dispositivo \\.\VBoxDrv y llamando a DeviceIoControl para enviar una dirección manipulada del kernel An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code. • https://www.exploit-db.com/exploits/6218 http://secunia.com/advisories/31361 http://securityreason.com/securityalert/4107 http://securitytracker.com/id?1020625 http://sunsolve.sun.com/search/document.do?assetkey=1-66-240095-1 http://virtualbox.org/wiki/Changelog http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability http://www.securityfocus.com/archive/1/495095/100/0/threaded http://www.securityfocus.com/bid/30481 http://www.vupen.com/english/advisories/2008/2 • CWE-264: Permissions, Privileges, and Access Controls •