This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the VBoxVGA graphics controller component. When handling the VBoxVHWASurfaceBase object, the process does not properly validate the existence of the object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-507 is classified as critical due to its ability to allow local privilege escalation.
To fix ZDI-20-507, update your Oracle VirtualBox installation to the latest version provided by Oracle.
ZDI-20-507 affects users of Oracle VirtualBox installations that are not patched against this vulnerability.
ZDI-20-507 is a local privilege escalation vulnerability that requires high-privileged code execution on the target guest system.
No, ZDI-20-507 cannot be exploited remotely as it requires local access to the affected guest system.