Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/52580 - | |
References | () http://secunia.com/advisories/34232 - Vendor Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-254568-1 - Patch, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/03/15/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/03/17/2 - | |
References | () http://www.securityfocus.com/bid/34080 - Exploit | |
References | () http://www.securitytracker.com/id?1021841 - | |
References | () http://www.virtualbox.org/ticket/3444 - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/0674 - Patch, Vendor Advisory | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=260331 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/49193 - |
Information
Published : 2009-03-12 15:20
Updated : 2024-11-21 01:01
NVD link : CVE-2009-0876
Mitre link : CVE-2009-0876
CVE.ORG link : CVE-2009-0876
JSON object : View
Products Affected
sun
- xvm_virtualbox
linux
- linux_kernel
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')