1 results (0.398 seconds)

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 2

The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address. La función VBoxDrvNtDeviceControl del archivo VBoxDrv.sys de Sun xVM VirtualBox en versiones anteriores a la 1.6.4, utiliza el método de comunicación METHOD_NEITHER para IOCTLs, que no validad adecuadamente el búfer asociado con el objeto Irp, el cual permite a los usuario locales ganar privilegios abriendo el dispositivo \\.\VBoxDrv y llamando a DeviceIoControl para enviar una dirección manipulada del kernel An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code. • https://www.exploit-db.com/exploits/6218 http://secunia.com/advisories/31361 http://securityreason.com/securityalert/4107 http://securitytracker.com/id?1020625 http://sunsolve.sun.com/search/document.do?assetkey=1-66-240095-1 http://virtualbox.org/wiki/Changelog http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability http://www.securityfocus.com/archive/1/495095/100/0/threaded http://www.securityfocus.com/bid/30481 http://www.vupen.com/english/advisories/2008/2 • CWE-264: Permissions, Privileges, and Access Controls •