7.2
CVSSv2

CVE-2008-3431

Published: 05/08/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox prior to 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sun xvm virtualbox 1.5.2

sun xvm virtualbox 1.5.4

sun xvm virtualbox 1.3.2

sun xvm virtualbox 1.5.6

sun xvm virtualbox 1.6.0

sun xvm virtualbox 1.3.8

sun xvm virtualbox 1.4.0

sun xvm virtualbox 1.5.0

sun xvm virtualbox 1.3.4

sun xvm virtualbox 1.3.6

sun xvm virtualbox

Exploits

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory wwwcoresecuritycom/corelabs/ Sun xVM VirtualBox Privilege Escalation Vulnerability *Advisory Information* Title: Sun xVM VirtualBox Privilege Escalation Vulnerability Advisory ID: CORE-2008-0716 Advisory URL: wwwcor ...
Core Security Technologies Advisory - The Sun xVM VirtualBox suffers from a privilege escalation vulnerability due to insufficient input validation in VboxDrvsys Proof of concept code included ...

Recent Articles

APT trends report Q2 2020
Securelist • GReAT • 29 Jul 2020

For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of. This is our latest installment, focus...