8.8
CVSSv3

CVE-2018-2844

Published: 19/04/2018 Updated: 15/03/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 410
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are before 5.1.36 and before 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle vm virtualbox

Github Repositories

Collection of resources about Virtualization

Awesome Virtualization A curated list of awesome resources about virtualization Table of Contents Chronology Books Courses Papers Research Projects Mainstream Hypervisors Documentation KVM Xen QEMU VMware VirtualBox Hyper-V Hypervisor Development Virtual Machine Introspection Attacking Hypervisors Malware Analysis Chronology 2005-November-13: Intel VT-x released on Pent

Exploitchain of my livedemo from my Security Expedition in b0rkenland talk

PoC-Exploitchain-GS-VBox-DirtyCow- Exploitchain of my livedemo from my Security Expedition in b0rkenland talk TODO Add example Exploit Files This Exploit Chain consists of the Following Exploits: Ghostcript RCE CVE-2018-16802 Virtualbox Escape - CVE CVE-2018-2844 Dirty Cow - CVE-2016-5195 Machine Setup Host System: Ubuntu 16044 – unpatched VirtualBox 526r120293 Gue

Collection of resources about Virtualization

Awesome Virtualization A curated list of awesome resources about virtualization Table of Contents Chronology Documentation Books Courses Papers Research Projects Mainstream Hypervisors Documentation KVM Xen QEMU VMware VirtualBox Hyper-V Hypervisor Development Virtual Machine Introspection Attacking Hypervisors KVM Xen VMware VirtualBox Hyper-V Malware Analysis Chrono