First published: Mon Feb 06 2023(Updated: )
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | <8.0.0 | |
Microsoft Windows | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0664 refers to a vulnerability found in the QEMU Guest Agent service for Windows that allows a local unprivileged user to elevate their privileges on the system.
CVE-2023-0664 affects QEMU because it allows a local unprivileged user to manipulate the QEMU Guest Agent's Windows installer via repair custom actions.
CVE-2023-0664 has a severity rating of 7.8 (high).
The QEMU versions up to and excluding 8.0.0 are affected by CVE-2023-0664.
To mitigate CVE-2023-0664, ensure that you are using QEMU version 8.0.0 or higher.