4.4
CVSSv2

CVE-2014-0981

Published: 31/03/2014 Updated: 09/10/2018
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

VBox/GuestHost/OpenGL/util/net.c in Oracle VirtualBox prior to 3.2.22, 4.0.x prior to 4.0.24, 4.1.x prior to 4.1.32, 4.2.x prior to 4.2.24, and 4.3.x prior to 4.3.8, when using 3D Acceleration allows local guest OS users to execute arbitrary code on the Chromium server via crafted Chromium network pointer in a (1) CR_MESSAGE_READBACK or (2) CR_MESSAGE_WRITEBACK message to the VBoxSharedCrOpenGL service, which triggers an arbitrary pointer dereference and memory corruption. NOTE: this issue was MERGED with CVE-2014-0982 because it is the same type of vulnerability affecting the same set of versions. All CVE users should reference CVE-2014-0981 instead of CVE-2014-0982.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle vm virtualbox 4.3.4

oracle vm virtualbox 4.3.6

oracle vm virtualbox 4.2.2

oracle vm virtualbox 4.2.20

oracle vm virtualbox 4.3.0

oracle vm virtualbox 4.3.2

oracle vm virtualbox 4.2.16

oracle vm virtualbox 4.2.18

oracle vm virtualbox 4.2.0

oracle vm virtualbox 4.2.10

oracle vm virtualbox 4.2.4

oracle vm virtualbox 4.2.6

oracle vm virtualbox 4.2.12

oracle vm virtualbox 4.2.14

oracle vm virtualbox 4.2.8

Vendor Advisories

Debian Bug report logs - #741602 virtualbox: CVE-2014-0981 CVE-2014-0982 CVE-2014-0983 Package: virtualbox; Maintainer for virtualbox is Debian Virtualbox Team <team+debian-virtualbox@trackerdebianorg>; Source for virtualbox is src:virtualbox (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Da ...
Francisco Falcon discovered that missing input sanitizing in the 3D acceleration code in VirtualBox could lead to the execution of arbitrary code on the host system For the oldstable distribution (squeeze), these problems have been fixed in version 3210-dfsg-1+squeeze3 For the stable distribution (wheezy), these problems have been fixed in vers ...

Exploits

Core Security - Corelabs Advisory corelabscoresecuritycom/ Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities 1 *Advisory Information* Title: Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities Advisory ID: CORE-2014-0002 Advisory URL: wwwcoresecuritycom/content/oracle-virtu ...
Core Security Technologies Advisory - Multiple memory corruption vulnerabilities have been found in the code that implements 3D Acceleration for OpenGL graphics in Oracle VirtualBox These vulnerabilities could allow an attacker who is already running code within a Guest OS to escape from the virtual machine and execute arbitrary code on the Host O ...