2 results (0.053 seconds)

CVSS: 2.1EPSS: 0%CPEs: 23EXPL: 0

Unspecified vulnerability in Guest Additions in Sun xVM VirtualBox 1.6.x and 2.0.x before 2.0.12, 2.1.x, and 2.2.x, and Sun VirtualBox before 3.0.10, allows guest OS users to cause a denial of service (memory consumption) on the guest OS via unknown vectors. Vulnerabilidad no especificada en Guest Additions en Sun xVM VirtualBox v1.6.x y v2.0.x anteriores a v2.0.12, v2.1.x, y v2.2.x, y en Sun VirtualBox versiones anteriores a v3.0.10, permite a usuarios del sistema operativo huésped provocar una denegación de servicio (consumo de memoria) en el sistema operativo huésped mediante vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html http://secunia.com/advisories/38420 http://sunsolve.sun.com/search/document.do?assetkey=1-66-271149-1 •

CVSS: 6.9EPSS: 0%CPEs: 8EXPL: 2

Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN. Sun xVM VirtualBox versiones 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2 y 2.1.4r42893 en Linux, permite a los usuarios locales alcanzar privilegios por medio de un ataque de enlace físico, que conserva los bits de setuid/setgid en Linux, relacionado con DT_RPATH:$ORIGIN. • https://www.exploit-db.com/exploits/32848 http://osvdb.org/52580 http://secunia.com/advisories/34232 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254568-1 http://www.openwall.com/lists/oss-security/2009/03/15/1 http://www.openwall.com/lists/oss-security/2009/03/17/2 http://www.securityfocus.com/bid/34080 http://www.securitytracker.com/id?1021841 http://www.virtualbox.org/ticket/3444 http://www.vupen.com/english/advisories/2009/0674 https:/ • CWE-59: Improper Link Resolution Before File Access ('Link Following') •