SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   QEMU Vendors:   QEMU.org
(QEMU.org Issues Fix for QEMU) Xen Out-of-Bounds Memory Write Error in cirrus_bitblt_cputovideo() Lets Local Administrative Users on a Guest System Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1037872
SecurityTracker URL:  http://securitytracker.com/id/1037872
CVE Reference:   CVE-2017-2620   (Links to External Site)
Date:  Feb 22 2017
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Xen. A local user on the guest system can gain elevated privileges on the host system. QEMU is affected.

A local administrative user on the guest system can trigger an out-of-bounds memory write error in cirrus_bitblt_cputovideo() to potentially gain elevated privileges on the host system.

Systems running on x86 with HVM guests and with the qemu process running in dom0 are affectged.

Guest systems with the "cirrus" emulated video card are affected.

ARM systems are not affected.

Systems using only PV guests are not affected.

Gerd Hoffmann of Red Hat reported this vulnerability.

Impact:   A local administrative user on the guest system can gain elevated privileges on the host system.
Solution:   QEMU.org has issued a proposed patch for CVE-2017-2620 for QEMU, available at:

https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html

Vendor URL:  www.qemu-project.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 22 2017 Xen Out-of-Bounds Memory Write Error in cirrus_bitblt_cputovideo() Lets Local Administrative Users on a Guest System Gain Elevated Privileges on the Host System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC