First published: Tue Jul 23 2019(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the shader_get_registers_used function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | >=5.0.0<5.2.32 | |
Oracle VM VirtualBox | >=6.0.0<6.0.10 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2867 is a vulnerability in Oracle VirtualBox that allows a high privileged attacker to escalate their privileges.
If you are using Oracle VirtualBox versions prior to 5.2.32 or 6.0.10, you may be affected by this vulnerability.
The severity of CVE-2019-2867 is high, with a CVSS score of 8.2.
To fix CVE-2019-2867, you should update your Oracle VirtualBox installation to version 5.2.32 or 6.0.10, depending on the affected version.
You can find more information about CVE-2019-2867 on the Oracle website and the Zero Day Initiative website.