// For flags

CVE-2009-0876

Sun xVM VirtualBox 2.0/2.1 - Local Privilege Escalation

Severity Score

6.9
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN.

Sun xVM VirtualBox versiones 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2 y 2.1.4r42893 en Linux, permite a los usuarios locales alcanzar privilegios por medio de un ataque de enlace fĂ­sico, que conserva los bits de setuid/setgid en Linux, relacionado con DT_RPATH:$ORIGIN.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-10 First Exploit
  • 2009-03-12 CVE Reserved
  • 2009-03-12 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.0.0
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.0.0"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.0.2
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.0.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.0.4
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.0.4"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.0.6r39760
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.0.6r39760"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.1.0
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.1.0"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.1.2
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.1.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe
Sun
Search vendor "Sun"
Xvm Virtualbox
Search vendor "Sun" for product "Xvm Virtualbox"
2.1.4r42893
Search vendor "Sun" for product "Xvm Virtualbox" and version "2.1.4r42893"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
*-
Safe