SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Citrix XenServer Vendors:   Citrix
(Citrix Issues Fix for Citrix XenServer) QEMU IDE Heap Overflow Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
SecurityTracker Alert ID:  1033090
SecurityTracker URL:  http://securitytracker.com/id/1033090
CVE Reference:   CVE-2015-5154   (Links to External Site)
Date:  Jul 28 2015
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0, 6.0.2, 6.1.0, 6.2.0, 6.5
Description:   A vulnerability was reported in QEMU. A local user on the guest system can gain elevated privileges on the host system. Citrix XenServer is affected.

A local privileged user on a guest system that has a CDROM drive enabled can issue specially crafted ATAPI commands to trigger a heap overflow in the IDE subsystem to execute arbitrary code on the host systems. The code will run on the host with the privileges of the QEMU process assigned to the guest system.

Kevin Wolf of Red Hat reported this vulnerability.

Impact:   A local privileged user on the guest system can gain elevated privileges on the host system.
Solution:   Citrix has issued a fix for Citrix XenServer.

The Citrix advisory is available at:

http://support.citrix.com/article/CTX201593

Vendor URL:  support.citrix.com/article/CTX201593 (Links to External Site)
Cause:   Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
Jul 27 2015 QEMU IDE Heap Overflow Lets Local Users on a Guest System Gain Elevated Privileges on the Host System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC