Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
VBox/GuestHost/OpenGL/util/net.c in Oracle VirtualBox before 3.2.22, 4.0.x before 4.0.24, 4.1.x before 4.1.32, 4.2.x before 4.2.24, and 4.3.x before 4.3.8, when using 3D Acceleration allows local guest OS users to execute arbitrary code on the Chromium server via crafted Chromium network pointer in a (1) CR_MESSAGE_READBACK or (2) CR_MESSAGE_WRITEBACK message to the VBoxSharedCrOpenGL service, which triggers an arbitrary pointer dereference and memory corruption. NOTE: this issue was MERGED with CVE-2014-0982 because it is the same type of vulnerability affecting the same set of versions. All CVE users should reference CVE-2014-0981 instead of CVE-2014-0982.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Oracle VirtualBox 3D Acceleration 安全漏洞
Vulnerability Description
Oracle VirtualBox(也称Oracle VM VirtualBox)是美国甲骨文(Oracle)公司的一套跨平台的虚拟化软件。该软件在同一台计算机上支持运行多个操作系统、创建VM群组、共享文件夹等。 Oracle VirtualBox 4.2.x至4.2.20版本和4.3.8之前的4.3.x版本中的VBox/GuestHost/OpenGL/util/net.c文件中的‘crNetRecvReadback’函数存在安全漏洞。当使用3D Acceleration时,本地攻击者可借助CR_MES
CVSS Information
N/A
Vulnerability Type
N/A