First published: Tue Aug 05 2008(Updated: )
An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun xVM VirtualBox | <=1.6.2 | |
Sun xVM VirtualBox | =1.5.2 | |
Sun xVM VirtualBox | =1.6.0 | |
Sun xVM VirtualBox | =1.5.0 | |
Sun xVM VirtualBox | =1.3.2 | |
Sun xVM VirtualBox | =1.5.6 | |
Sun xVM VirtualBox | =1.5.4 | |
Sun xVM VirtualBox | =1.3.8 | |
Sun xVM VirtualBox | =1.3.4 | |
Sun xVM VirtualBox | =1.4.0 | |
Sun xVM VirtualBox | =1.3.6 | |
Oracle VirtualBox | ||
Oracle VirtualBox | <1.6.4 | |
<1.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3431 is classified as a critical severity vulnerability due to its potential for local arbitrary code execution.
To remediate CVE-2008-3431, upgrade Sun xVM VirtualBox to version 1.6.4 or later.
CVE-2008-3431 affects Sun xVM VirtualBox versions up to and including 1.6.2, along with specified earlier versions.
CVE-2008-3431 is an input validation vulnerability that can lead to local execution of arbitrary code.
No, CVE-2008-3431 is not classified as a zero-day vulnerability since it has already been identified and addressed.