First published: Tue Sep 06 2022(Updated: )
A flaw was found in the vm2 sandbox when running untrusted code, as the sandbox setup does not manage proper exception handling. This flaw allows an attacker to bypass the sandbox protections and gain remote code execution on the hypervisor host or the host which is running the sandbox.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/vm2 | <3.9.11 | 3.9.11 |
Vm2 Project | <3.9.11 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-36067 has been assigned a high severity rating due to the potential for remote code execution.
To mitigate CVE-2022-36067, upgrade vm2 to version 3.9.12 or later, where the vulnerability has been addressed.
CVE-2022-36067 affects all versions of vm2 prior to 3.9.12 when running untrusted code.
CVE-2022-36067 is categorized as a sandbox bypass vulnerability, allowing execution of untrusted code on the host.
Yes, CVE-2022-36067 can be exploited remotely, allowing an attacker to execute code on the hypervisor host.