René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

173 lines
5.9 KiB
JSON

{
"id": "CVE-2008-3431",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-05T19:41:00.000",
"lastModified": "2018-10-11T20:48:19.147",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-03-03",
"cisaActionDue": "2022-03-24",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Oracle VirtualBox Insufficient Input Validation Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\\\.\\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address."
},
{
"lang": "es",
"value": "La funci\u00f3n VBoxDrvNtDeviceControl del archivo VBoxDrv.sys de Sun xVM VirtualBox en versiones anteriores a la 1.6.4, utiliza el m\u00e9todo de comunicaci\u00f3n METHOD_NEITHER para IOCTLs, que no validad adecuadamente el b\u00fafer asociado con el objeto Irp, el cual permite a los usuario locales ganar privilegios abriendo el dispositivo \\\\.\\VBoxDrv y llamando a DeviceIoControl para enviar una direcci\u00f3n manipulada del kernel"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.2",
"matchCriteriaId": "4E6BF0D3-5C75-4EC2-943E-3E3BBC1F9806"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DA16A6-8C03-485A-B157-E86F270DA187"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7C0368-A4D1-4F98-9311-3B28B5002FEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F58DB367-855B-4D4B-A6D0-A8E9E52A7474"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "49D1BACC-C58D-480C-915B-1716A0B8D249"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "75554A1B-9A13-49EC-A101-B03C19702BD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA586938-0269-42C9-A974-7FC0CFF721AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6AD5B8-3739-46EB-86FE-50A5288712DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "109414D9-5A5D-4B86-8F2B-687381CFEAAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CDDC5A-FFF6-40CE-A694-803AFAD15589"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:xvm_virtualbox:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7A5D6B-F6F7-470F-8356-D2E1674CA46C"
}
]
}
]
}
],
"references": [
{
"url": "http://securityreason.com/securityalert/4107",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1020625",
"source": "cve@mitre.org"
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-240095-1",
"source": "cve@mitre.org"
},
{
"url": "http://virtualbox.org/wiki/Changelog",
"source": "cve@mitre.org"
},
{
"url": "http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/495095/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/30481",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2293",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44202",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/6218",
"source": "cve@mitre.org"
}
]
}