oss-sec mailing list archives

Re: CVE Request: VirtualBox tmp file issue


From: Moritz Muehlenhoff <jmm () inutil org>
Date: Mon, 24 Nov 2008 22:20:20 +0100

Ludwig Nussel wrote:

http://www.virtualbox.org/wiki/Changelog:
VirtualBox 2.0.6
- Linux/Solaris/Darwin hosts: verify permissions in /tmp/vbox-$USER-ipc

These changes match that description:
http://www.virtualbox.org/changeset?new=trunk%2Fsrc%2Flibs%2Fxpcom18a4%2Fipc%2Fipcd%2Fdaemon%2Fsrc%2FipcdUnix.cpp%4013810&old=trunk%2Fsrc%2Flibs%2Fxpcom18a4%2Fipc%2Fipcd%2Fdaemon%2Fsrc%2FipcdUnix.cpp%407049

VirtualBox uses /tmp/vbox-$USER-ipc to store a socket and a lock
file. The lock file is truncated after a simple open call. AFAICS
creating /tmp/vbox-$USER-ipc before the victim starts VirtualBox
could therefore be exploited to create files as the victim or
truncate files of the victim.

This is http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504149

(I already sent this to vendor-sec on the 7th, but the CVE
request seems to have fallen through the crack)

Cheers,
        Moritz


Current thread: