First published: Tue Feb 10 2009(Updated: )
A buffer overflow flaw was found in libvirt_proxy. libvirt_proxy is set to run as a setuid root by default, so in theory this could allow for a local user to become root. Normally the stack protector would prevent this from being an issue, but it seems that with gcc optimizations, the function in question is being inlined into main(), preventing the stack protector from catching this. The original report can be found here: <a href="https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html">https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html</a> The patch is here: <a href="http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28">http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libvirt | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0036 is considered to have high severity due to the potential for local users to escalate privileges to root.
To fix CVE-2009-0036, upgrade to a version of libvirt that contains the patch for this buffer overflow vulnerability.
CVE-2009-0036 is caused by a buffer overflow flaw in the libvirt_proxy component that runs as setuid root.
CVE-2009-0036 cannot be exploited remotely; it requires local access to the affected system.
Users of libvirt version 0.5.1 are affected by CVE-2009-0036, especially those with setuid root configurations.