Xen Qemu Cirrus VGA Heap Overflow Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
|
SecurityTracker Alert ID: 1038023 |
SecurityTracker URL: http://securitytracker.com/id/1038023
|
CVE Reference:
CVE-2016-9603
(Links to External Site)
|
Date: Mar 15 2017
|
Impact:
User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Xen. A local user on the guest system can gain elevated privileges on the host system.
A local administrative user on the guest system can trigger a heap overflow in the Cirrus VGA emulator to execute arbitrary code with the privileges of the device model process and potentially gain elevated privileges on the host system.
HVM guest systems with the Cirrus video card are affected.
|
Impact:
A local administrative user on the guest system can gain elevated privileges on the host system.
|
Solution:
The vendor has issued a fix (xsa211-qemuu.patch, xsa211-qemuu-4.8.patch, xsa211-qemuu-4.7.patch, xsa211-qemuu-4.6.patch, xsa211-qemuu-4.4.patch, xsa211-qemut.patch, xsa211-qemut-4.5.patch).
The vendor advisory is available at:
https://xenbits.xen.org/xsa/advisory-211.html
|
Vendor URL: xenbits.xen.org/xsa/advisory-211.html (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|