Vulnerability CVE-2016-9602


Published: 2018-04-26

Description:
Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
QEMU Host Filesystem Arbitrary Access
jannh
19.02.2017

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
10/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
QEMU -> QEMU 
Debian -> Debian linux 

 References:
http://www.openwall.com/lists/oss-security/2017/01/17/12
http://www.securityfocus.com/bid/95461
http://www.securitytracker.com/id/1037604
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9602
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06225.html
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04347.html
https://security.gentoo.org/glsa/201704-01

Copyright 2024, cxsecurity.com

 

Back to Top