Xen HVM qemu Flaw Lets Local Users Access VGA Backend on the Target Guest System
|
SecurityTracker Alert ID: 1031919 |
SecurityTracker URL: http://securitytracker.com/id/1031919
|
CVE Reference:
CVE-2015-2152
(Links to External Site)
|
Date: Mar 12 2015
|
Impact:
User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Xen. A local user on the guest system may be able to obtain elevated privileges on the target guest system.
On systems with an emulated VGA device for an x86 HVM guest qemu, an SDL or VNC backend may be enabled unexpectedly. A local user with limited privileges but granted access to execute Xen toolstack code via a restricted environment (e.g., some restricted sudo configurations) may be able to access a backend. The local user can conduct attacks on the system via the VNC or X network protocols.
ARM systems are not affected.
PV domains are not affected.
Sander Eikelenboom reported this vulnerability.
|
Impact:
A local user with limited privileges on the guest system may be able to access an SDL or VNC backend on the target guest system without permission.
|
Solution:
The vendor has issued a fix (xsa119-unstable.patch, xsa119-4.2.patch).
The vendor's advisory is available at:
http://xenbits.xen.org/xsa/advisory-119.html
|
Vendor URL: xenbits.xen.org/xsa/advisory-119.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|