CVE-2008-3431
KEV
🔴 Łataj teraz
Błąd w VBoxDrv.sys umożliwia lokalnym użytkownikom eskalację uprawnień przez manipulację IOCTL.
CVSS
8.8
EPSS
5.4%
Exploit
weaponized
Vendor
oracle
Opis źródłowy (NVD)
The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 5.4% |
| Opublikowano (NVD) | 2008-08-05 19:41:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 14:12:18 UTC |
Referencje
- http://secunia.com/advisories/31361 (cve@mitre.org) [Broken Link, Vendor Advisory]
- http://securityreason.com/securityalert/4107 (cve@mitre.org) [Broken Link]
- http://securitytracker.com/id?1020625 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-240095-1 (cve@mitre.org) [Broken Link]
- http://virtualbox.org/wiki/Changelog (cve@mitre.org) [Product]
- http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability (cve@mitre.org) [Exploit, Third Party Advisory]
- http://www.securityfocus.com/archive/1/495095/100/0/threaded (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/30481 (cve@mitre.org) [Broken Link, Exploit, Third Party Advisory, VDB Entry]
- http://www.vupen.com/english/advisories/2008/2293 (cve@mitre.org) [Broken Link]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44202 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/6218 (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2008-3431 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]