3 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 23EXPL: 0

Unspecified vulnerability in Guest Additions in Sun xVM VirtualBox 1.6.x and 2.0.x before 2.0.12, 2.1.x, and 2.2.x, and Sun VirtualBox before 3.0.10, allows guest OS users to cause a denial of service (memory consumption) on the guest OS via unknown vectors. Vulnerabilidad no especificada en Guest Additions en Sun xVM VirtualBox v1.6.x y v2.0.x anteriores a v2.0.12, v2.1.x, y v2.2.x, y en Sun VirtualBox versiones anteriores a v3.0.10, permite a usuarios del sistema operativo huésped provocar una denegación de servicio (consumo de memoria) en el sistema operativo huésped mediante vectores desconocidos. • http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html http://secunia.com/advisories/38420 http://sunsolve.sun.com/search/document.do?assetkey=1-66-271149-1 •

CVSS: 6.9EPSS: 0%CPEs: 8EXPL: 2

Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN. Sun xVM VirtualBox versiones 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2 y 2.1.4r42893 en Linux, permite a los usuarios locales alcanzar privilegios por medio de un ataque de enlace físico, que conserva los bits de setuid/setgid en Linux, relacionado con DT_RPATH:$ORIGIN. • https://www.exploit-db.com/exploits/32848 http://osvdb.org/52580 http://secunia.com/advisories/34232 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254568-1 http://www.openwall.com/lists/oss-security/2009/03/15/1 http://www.openwall.com/lists/oss-security/2009/03/17/2 http://www.securityfocus.com/bid/34080 http://www.securitytracker.com/id?1021841 http://www.virtualbox.org/ticket/3444 http://www.vupen.com/english/advisories/2009/0674 https:/ • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 2

The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address. La función VBoxDrvNtDeviceControl del archivo VBoxDrv.sys de Sun xVM VirtualBox en versiones anteriores a la 1.6.4, utiliza el método de comunicación METHOD_NEITHER para IOCTLs, que no validad adecuadamente el búfer asociado con el objeto Irp, el cual permite a los usuario locales ganar privilegios abriendo el dispositivo \\.\VBoxDrv y llamando a DeviceIoControl para enviar una dirección manipulada del kernel An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code. • https://www.exploit-db.com/exploits/6218 http://secunia.com/advisories/31361 http://securityreason.com/securityalert/4107 http://securitytracker.com/id?1020625 http://sunsolve.sun.com/search/document.do?assetkey=1-66-240095-1 http://virtualbox.org/wiki/Changelog http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability http://www.securityfocus.com/archive/1/495095/100/0/threaded http://www.securityfocus.com/bid/30481 http://www.vupen.com/english/advisories/2008/2 • CWE-264: Permissions, Privileges, and Access Controls •