This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle VirtualBox. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of drdynvc packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the RDP service.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM VirtualBox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-453 is rated as critical due to its ability to allow remote code execution without authentication.
To fix ZDI-21-453, users should update Oracle VirtualBox to the latest patched version released by Oracle.
ZDI-21-453 affects Oracle VirtualBox installations.
Yes, ZDI-21-453 can be exploited remotely by attackers without the need for authentication.
ZDI-21-453 is a remote code execution vulnerability related to the handling of drdynvc packets.