ID CVE-2018-2844
Summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.36 and Prior to 5.2.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
References
Vulnerable Configurations
  • Oracle VM VirtualBox 5.1.0
    cpe:2.3:a:oracle:vm_virtualbox:5.1.0
  • Oracle VM VirtualBox 5.1.2
    cpe:2.3:a:oracle:vm_virtualbox:5.1.2
  • Oracle VM VirtualBox 5.1.4
    cpe:2.3:a:oracle:vm_virtualbox:5.1.4
  • Oracle VM VirtualBox 5.1.6
    cpe:2.3:a:oracle:vm_virtualbox:5.1.6
  • Oracle VM VirtualBox 5.1.8
    cpe:2.3:a:oracle:vm_virtualbox:5.1.8
  • Oracle VM VirtualBox 5.1.10
    cpe:2.3:a:oracle:vm_virtualbox:5.1.10
  • Oracle VM VirtualBox 5.1.12
    cpe:2.3:a:oracle:vm_virtualbox:5.1.12
  • Oracle VM VirtualBox 5.1.14
    cpe:2.3:a:oracle:vm_virtualbox:5.1.14
  • Oracle VM VirtualBox 5.1.16
    cpe:2.3:a:oracle:vm_virtualbox:5.1.16
  • Oracle VM VirtualBox 5.1.18
    cpe:2.3:a:oracle:vm_virtualbox:5.1.18
  • Oracle VM VirtualBox 5.1.20
    cpe:2.3:a:oracle:vm_virtualbox:5.1.20
  • Oracle VM VirtualBox 5.1.22
    cpe:2.3:a:oracle:vm_virtualbox:5.1.22
  • Oracle VM VirtualBox 5.1.24
    cpe:2.3:a:oracle:vm_virtualbox:5.1.24
  • Oracle VM VirtualBox 5.1.26
    cpe:2.3:a:oracle:vm_virtualbox:5.1.26
  • Oracle VM VirtualBox 5.1.28
    cpe:2.3:a:oracle:vm_virtualbox:5.1.28
  • Oracle VM VirtualBox 5.1.30
    cpe:2.3:a:oracle:vm_virtualbox:5.1.30
  • Oracle VM VirtualBox 5.1.32
    cpe:2.3:a:oracle:vm_virtualbox:5.1.32
  • Oracle VM VirtualBox 5.1.34
    cpe:2.3:a:oracle:vm_virtualbox:5.1.34
  • Oracle VM VirtualBox 5.2.0
    cpe:2.3:a:oracle:vm_virtualbox:5.2.0
  • Oracle VM VirtualBox 5.2.2
    cpe:2.3:a:oracle:vm_virtualbox:5.2.2
  • Oracle VM VirtualBox 5.2.4
    cpe:2.3:a:oracle:vm_virtualbox:5.2.4
  • Oracle VM VirtualBox 5.2.6
    cpe:2.3:a:oracle:vm_virtualbox:5.2.6
  • Oracle VM VirtualBox 5.2.8
    cpe:2.3:a:oracle:vm_virtualbox:5.2.8
CVSS
Base: 4.6
Impact:
Exploitability:
CWE CWE-284
CAPEC
  • Embedding Scripts within Scripts
    An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. The attacker leverages this capability to execute scripts to execute his/her own script by embedding it within other scripts that the target software is likely to execute. The attacker must have the ability to inject script into script that is likely to be executed. If this is done, then the attacker can potentially launch a variety of probes and attacks against the web server's local environment, in many cases the so-called DMZ, back end resources the web server can communicate with, and other hosts. With the proliferation of intermediaries, such as Web App Firewalls, network devices, and even printers having JVMs and Web servers, there are many locales where an attacker can inject malicious scripts. Since this attack pattern defines scripts within scripts, there are likely privileges to execute said attack on the host. Of course, these attacks are not solely limited to the server side, client side scripts like Ajax and client side JavaScript can contain malicious scripts as well. In general all that is required is for there to be sufficient privileges to execute a script, but not protected against writing.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
exploit-db via4
description VirtualBox 5.2.6.r120293 - VM Escape. Local exploit for Linux platform
id EDB-ID:45372
last seen 2018-10-07
modified 2018-08-28
published 2018-08-28
reporter Exploit-DB
source https://www.exploit-db.com/download/45372/
title VirtualBox 5.2.6.r120293 - VM Escape
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201805-08.NASL
    description The remote host is affected by the vulnerability described in GLSA-201805-08 (VirtualBox: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details. Impact : An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-09-04
    plugin id 109975
    published 2018-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109975
    title GLSA-201805-08 : VirtualBox: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-938.NASL
    description This update for kbuild, virtualbox fixes the following issues : kbuild changes : - Update to version 0.1.9998svn3110 - Do not assume glibc glob internals - Support GLIBC glob interface version 2 - Fix build failure (boo#1079838) - Fix build with GCC7 (boo#1039375) - Fix build by disabling vboxvideo_drv.so virtualbox security fixes (boo#1101667, boo#1076372) : - CVE-2018-3005 - CVE-2018-3055 - CVE-2018-3085 - CVE-2018-3086 - CVE-2018-3087 - CVE-2018-3088 - CVE-2018-3089 - CVE-2018-3090 - CVE-2018-3091 - CVE-2018-2694 - CVE-2018-2698 - CVE-2018-2685 - CVE-2018-2686 - CVE-2018-2687 - CVE-2018-2688 - CVE-2018-2689 - CVE-2018-2690 - CVE-2018-2676 - CVE-2018-2693 - CVE-2017-5715 virtualbox other changes : - Version bump to 5.2.16 - Use %{?linux_make_arch} when building kernel modules (boo#1098050) - Fixed vboxguestconfig.sh script - Update warning regarding the security hole in USB passthrough. (boo#1097248) - Fixed include for build with Qt 5.11 (boo#1093731) - You can find a detailed list of changes [here](https://www.virtualbox.org/wiki/Changelog#v16)
    last seen 2019-02-21
    modified 2018-08-27
    plugin id 112143
    published 2018-08-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112143
    title openSUSE Security Update : kbuild / virtualbox (openSUSE-2018-938) (Spectre)
  • NASL family Misc.
    NASL id VIRTUALBOX_5_2_10.NASL
    description The version of Oracle VM VirtualBox running on the remote host is 5.1.x prior to 5.1.36 or 5.2.x prior to 5.2.10. It is, therefore, affected by multiple vulnerabilities as noted in the April 2018 Critical Patch Update advisory. Please consult the CVRF details for the applicable CVEs for additional information. Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-08
    plugin id 109682
    published 2018-05-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109682
    title Oracle VM VirtualBox 5.1.x < 5.1.36 / 5.2.x < 5.2.10 (April 2018 CPU)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-389.NASL
    description This update for VirtualBox to version 5.1.36 fixes multiple issues : Security issues fixed : - CVE-2018-0739: Unauthorized remote attacker may have caused a hang or frequently repeatable crash (complete DOS) - CVE-2018-2830: Attacker with host login may have compromised Virtualbox or further system services after interaction with a third user - CVE-2018-2831: Attacker with host login may have compromised VirtualBox or further system services, allowing read access to some data - CVE-2018-2835: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2836: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2837: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2842: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2843: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2844: Attacker with host login may have gained control over VirtualBox and possibly further system services after interacting with a third user - CVE-2018-2845: Attacker with host login may have caused a hang or frequently repeatable crash (complete DOS), and perform unauthorized read and write operation to some VirtualBox accessible data - CVE-2018-2860: Privileged attacker may have gained control over VirtualBox and possibly further system services http://www.oracle.com/technetwork/security-advisory/cpuapr2018verbose- 3678108.html http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067 .html#AppendixOVIR This update also contains all upstream fixes and improvements in the stable 5.1.36 release.
    last seen 2019-02-21
    modified 2018-09-04
    plugin id 109294
    published 2018-04-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109294
    title openSUSE Security Update : virtualbox (openSUSE-2018-389) (Optionsbleed)
refmap via4
bid 103855
confirm http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
gentoo GLSA-201805-08
sectrack 1040707
Last major update 18-04-2018 - 22:29
Published 18-04-2018 - 22:29
Last modified 07-03-2019 - 14:51
Back to Top