QEMU IDE Heap Overflow Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
|
SecurityTracker Alert ID: 1033074 |
SecurityTracker URL: http://securitytracker.com/id/1033074
|
CVE Reference:
CVE-2015-5154
(Links to External Site)
|
Date: Jul 27 2015
|
Impact:
User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in QEMU. A local user on the guest system can gain elevated privileges on the host system.
A local privileged user on a guest system that has a CDROM drive enabled can issue specially crafted ATAPI commands to trigger a heap overflow in the IDE subsystem to execute arbitrary code on the host systems. The code will run on the host with the privileges of the QEMU process assigned to the guest system.
Kevin Wolf of Red Hat reported this vulnerability.
|
Impact:
A local privileged user on the guest system can gain elevated privileges on the host system.
|
Solution:
A proposed patch is available at:
https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05162.html
|
Vendor URL: wiki.qemu.org/Main_Page (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|