CVE-2009-0876 – Sun xVM VirtualBox 2.0/2.1 - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2009-0876
Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN. Sun xVM VirtualBox versiones 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2 y 2.1.4r42893 en Linux, permite a los usuarios locales alcanzar privilegios por medio de un ataque de enlace físico, que conserva los bits de setuid/setgid en Linux, relacionado con DT_RPATH:$ORIGIN. • https://www.exploit-db.com/exploits/32848 http://osvdb.org/52580 http://secunia.com/advisories/34232 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254568-1 http://www.openwall.com/lists/oss-security/2009/03/15/1 http://www.openwall.com/lists/oss-security/2009/03/17/2 http://www.securityfocus.com/bid/34080 http://www.securitytracker.com/id?1021841 http://www.virtualbox.org/ticket/3444 http://www.vupen.com/english/advisories/2009/0674 https:/ • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2008-3431 – Oracle VirtualBox Insufficient Input Validation Vulnerability
https://notcve.org/view.php?id=CVE-2008-3431
The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address. La función VBoxDrvNtDeviceControl del archivo VBoxDrv.sys de Sun xVM VirtualBox en versiones anteriores a la 1.6.4, utiliza el método de comunicación METHOD_NEITHER para IOCTLs, que no validad adecuadamente el búfer asociado con el objeto Irp, el cual permite a los usuario locales ganar privilegios abriendo el dispositivo \\.\VBoxDrv y llamando a DeviceIoControl para enviar una dirección manipulada del kernel An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code. • https://www.exploit-db.com/exploits/6218 http://secunia.com/advisories/31361 http://securityreason.com/securityalert/4107 http://securitytracker.com/id?1020625 http://sunsolve.sun.com/search/document.do?assetkey=1-66-240095-1 http://virtualbox.org/wiki/Changelog http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability http://www.securityfocus.com/archive/1/495095/100/0/threaded http://www.securityfocus.com/bid/30481 http://www.vupen.com/english/advisories/2008/2 • CWE-264: Permissions, Privileges, and Access Controls •