CVE-2009-0036
libvirt_proxy 0.5.1 - Local Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check.
Desbordamiento de búfer en la función proxyReadClientSocket en proxy/libvirt_proxy.c en libvirt_proxy v0.5.1, podría permitir a usuarios locales elevar sus privilegios mediante el envío de una parte de la cabecera de un paquete virProxyPacket y posteriormente enviando el resto del paquete con valores manipulados en la cabecera del mismo. Relacionado con el uso de memoria que no ha sido inicializada en un control de validación.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-12-15 CVE Reserved
- 2009-02-11 CVE Published
- 2009-04-27 First Exploit
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.et.redhat.com/?p=libvirt.git%3Ba=commitdiff%3Bh=2bb0657e28 | X_refsource_confirm | |
http://openwall.com/lists/oss-security/2009/02/10/8 | Mailing List | |
http://secunia.com/advisories/34397 | Third Party Advisory | |
http://www.securityfocus.com/bid/33724 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10127 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2009-0382.html | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=484947 | 2009-03-19 | |
https://access.redhat.com/security/cve/CVE-2009-0036 | 2009-03-19 |