SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen HVM qemu Flaw Lets Local Users Access VGA Backend on the Target Guest System
SecurityTracker Alert ID:  1031919
SecurityTracker URL:  http://securitytracker.com/id/1031919
CVE Reference:   CVE-2015-2152   (Links to External Site)
Date:  Mar 12 2015
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Xen. A local user on the guest system may be able to obtain elevated privileges on the target guest system.

On systems with an emulated VGA device for an x86 HVM guest qemu, an SDL or VNC backend may be enabled unexpectedly. A local user with limited privileges but granted access to execute Xen toolstack code via a restricted environment (e.g., some restricted sudo configurations) may be able to access a backend. The local user can conduct attacks on the system via the VNC or X network protocols.

ARM systems are not affected.

PV domains are not affected.

Sander Eikelenboom reported this vulnerability.

Impact:   A local user with limited privileges on the guest system may be able to access an SDL or VNC backend on the target guest system without permission.
Solution:   The vendor has issued a fix (xsa119-unstable.patch, xsa119-4.2.patch).

The vendor's advisory is available at:

http://xenbits.xen.org/xsa/advisory-119.html

Vendor URL:  xenbits.xen.org/xsa/advisory-119.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC