Gentoo Archives: gentoo-announce

From: Stefan Behte <craig@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 201001-04 ] VirtualBox: Multiple vulnerabilities
Date: Wed, 13 Jan 2010 22:19:12
Message-Id: 4B4E4352.3060903@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201001-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: VirtualBox: Multiple vulnerabilities
9 Date: January 13, 2010
10 Bugs: #288836, #294678
11 ID: 201001-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities in VirtualBox were found, the worst of which
19 allowing for privilege escalation.
20
21 Background
22 ==========
23
24 The VirtualBox family provides powerful x86 virtualization products.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 virtualbox-bin < 3.0.12 >= 3.0.12
33 2 virtualbox-ose < 3.0.12 >= 3.0.12
34 3 virtualbox-guest-additions < 3.0.12 >= 3.0.12
35 4 virtualbox-ose-additions < 3.0.12 >= 3.0.12
36 -------------------------------------------------------------------
37 4 affected packages on all of their supported architectures.
38 -------------------------------------------------------------------
39
40 Description
41 ===========
42
43 Thomas Biege of SUSE discovered multiple vulnerabilities:
44
45 * A shell metacharacter injection in popen() (CVE-2009-3692) and a
46 possible buffer overflow in strncpy() in the VBoxNetAdpCtl
47 configuration tool.
48
49 * An unspecified vulnerability in VirtualBox Guest Additions
50 (CVE-2009-3940).
51
52 Impact
53 ======
54
55 A local, unprivileged attacker with the permission to run VirtualBox
56 could gain root privileges. A guest OS local user could cause a Denial
57 of Service (memory consumption) on the guest OS via unknown vectors.
58
59 Workaround
60 ==========
61
62 There is no known workaround at this time.
63
64 Resolution
65 ==========
66
67 All users of the binary version of VirtualBox should upgrade to the
68 latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose
72 ">=app-emulation/virtualbox-bin-3.0.12"
73
74 All users of the Open Source version of VirtualBox should upgrade to
75 the latest version:
76
77 # emerge --sync
78 # emerge --ask --oneshot --verbose
79 ">=app-emulation/virtualbox-ose-3.0.12"
80
81 All users of the binary VirtualBox Guest Additions should upgrade to
82 the latest version:
83
84 # emerge --sync
85 # emerge --ask --oneshot --verbose
86 ">=app-emulation/virtualbox-guest-additions-3.0.12"
87
88 All users of the Open Source VirtualBox Guest Additions should upgrade
89 to the latest version:
90
91 # emerge --sync
92 # emerge --ask --oneshot --verbose
93 ">=app-emulation/virtualbox-ose-additions-3.0.12"
94
95 References
96 ==========
97
98 [ 1 ] CVE-2009-3692
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3692
100 [ 2 ] CVE-2009-3940
101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3940
102
103 Availability
104 ============
105
106 This GLSA and any updates to it are available for viewing at
107 the Gentoo Security Website:
108
109 http://security.gentoo.org/glsa/glsa-201001-04.xml
110
111 Concerns?
112 =========
113
114 Security is a primary focus of Gentoo Linux and ensuring the
115 confidentiality and security of our users machines is of utmost
116 importance to us. Any security concerns should be addressed to
117 security@g.o or alternatively, you may file a bug at
118 https://bugs.gentoo.org.
119
120 License
121 =======
122
123 Copyright 2010 Gentoo Foundation, Inc; referenced text
124 belongs to its owner(s).
125
126 The contents of this document are licensed under the
127 Creative Commons - Attribution / Share Alike license.
128
129 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature