6.9
CVSSv2

CVE-2014-0983

Published: 31/03/2014 Updated: 09/10/2018
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 700
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple array index errors in programs that are automatically generated by VBox/HostServices/SharedOpenGL/crserverlib/server_dispatch.py in Oracle VirtualBox 4.2.x up to and including 4.2.20 and 4.3.x prior to 4.3.8, when using 3D Acceleration, allow local guest OS users to execute arbitrary code on the Chromium server via certain CR_MESSAGE_OPCODES messages with a crafted index, which are not properly handled by the (1) CR_VERTEXATTRIB4NUBARB_OPCODE to the crServerDispatchVertexAttrib4NubARB function, (2) CR_VERTEXATTRIB1DARB_OPCODE to the crServerDispatchVertexAttrib1dARB function, (3) CR_VERTEXATTRIB1FARB_OPCODE to the crServerDispatchVertexAttrib1fARB function, (4) CR_VERTEXATTRIB1SARB_OPCODE to the crServerDispatchVertexAttrib1sARB function, (5) CR_VERTEXATTRIB2DARB_OPCODE to the crServerDispatchVertexAttrib2dARB function, (6) CR_VERTEXATTRIB2FARB_OPCODE to the crServerDispatchVertexAttrib2fARB function, (7) CR_VERTEXATTRIB2SARB_OPCODE to the crServerDispatchVertexAttrib2sARB function, (8) CR_VERTEXATTRIB3DARB_OPCODE to the crServerDispatchVertexAttrib3dARB function, (9) CR_VERTEXATTRIB3FARB_OPCODE to the crServerDispatchVertexAttrib3fARB function, (10) CR_VERTEXATTRIB3SARB_OPCODE to the crServerDispatchVertexAttrib3sARB function, (11) CR_VERTEXATTRIB4DARB_OPCODE to the crServerDispatchVertexAttrib4dARB function, (12) CR_VERTEXATTRIB4FARB_OPCODE to the crServerDispatchVertexAttrib4fARB function, and (13) CR_VERTEXATTRIB4SARB_OPCODE to the crServerDispatchVertexAttrib4sARB function.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle vm virtualbox 4.3.0

oracle vm virtualbox 4.2.16

oracle vm virtualbox 4.2.10

oracle vm virtualbox 4.2.12

oracle vm virtualbox 4.2.14

oracle vm virtualbox 4.2.8

oracle vm virtualbox 4.3.2

oracle vm virtualbox 4.3.4

oracle vm virtualbox 4.2.2

oracle vm virtualbox 4.2.20

oracle vm virtualbox 4.3.6

oracle vm virtualbox 4.2.0

oracle vm virtualbox 4.2.4

oracle vm virtualbox 4.2.6

oracle vm virtualbox 4.2.18

Vendor Advisories

Debian Bug report logs - #741602 virtualbox: CVE-2014-0981 CVE-2014-0982 CVE-2014-0983 Package: virtualbox; Maintainer for virtualbox is Debian Virtualbox Team <team+debian-virtualbox@trackerdebianorg>; Source for virtualbox is src:virtualbox (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Da ...
Francisco Falcon discovered that missing input sanitizing in the 3D acceleration code in VirtualBox could lead to the execution of arbitrary code on the host system For the oldstable distribution (squeeze), these problems have been fixed in version 3210-dfsg-1+squeeze3 For the stable distribution (wheezy), these problems have been fixed in vers ...

Exploits

Core Security Technologies Advisory - Multiple memory corruption vulnerabilities have been found in the code that implements 3D Acceleration for OpenGL graphics in Oracle VirtualBox These vulnerabilities could allow an attacker who is already running code within a Guest OS to escape from the virtual machine and execute arbitrary code on the Host O ...
Core Security - Corelabs Advisory corelabscoresecuritycom/ Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities 1 *Advisory Information* Title: Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities Advisory ID: CORE-2014-0002 Advisory URL: wwwcoresecuritycom/content/oracle-virtu ...
## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'rex' class Metasploit3 < Msf::Exploit::Local Rank = AverageRanking DEVICE = '\\\\\\VBoxGuest' INVALID_HANDLE_VALUE = 0xFFFFFFFF # VBOX HGCM protocol constan ...