First published: Wed Apr 15 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle VirtualBox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within handling of D3D9 shader objects. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox | <5.2.40 | |
Oracle VM VirtualBox | >=6.0.0<6.0.20 | |
Oracle VM VirtualBox | >=6.1.0<6.1.6 | |
openSUSE Leap | =15.1 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2902 is a vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization that allows for remote code execution.
CVE-2020-2902 has a severity rating of 8.8 (High).
Versions prior to 5.2.40, prior to 6.0.20, and prior to 6.1.6 of Oracle VirtualBox are affected by CVE-2020-2902.
CVE-2020-2902 can be easily exploited by a low privileged attacker with logon access to the infrastructure where Oracle VM VirtualBox is installed.
You can find more information about CVE-2020-2902 in the references provided: http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html, https://security.gentoo.org/glsa/202101-09, https://www.oracle.com/security-alerts/cpuapr2020.html