Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xvm_virtualbox | Sun | 2.0.0 (including) | 2.0.0 (including) |
Xvm_virtualbox | Sun | 2.0.2 (including) | 2.0.2 (including) |
Xvm_virtualbox | Sun | 2.0.4 (including) | 2.0.4 (including) |
Xvm_virtualbox | Sun | 2.0.6r39760 (including) | 2.0.6r39760 (including) |
Xvm_virtualbox | Sun | 2.1.0 (including) | 2.1.0 (including) |
Xvm_virtualbox | Sun | 2.1.2 (including) | 2.1.2 (including) |
Xvm_virtualbox | Sun | 2.1.4r42893 (including) | 2.1.4r42893 (including) |