CVE-2008-5256
Published Nov 27, 2008
Last updated 7 years ago
Overview
- Description
- The AcquireDaemonLock function in ipcdUnix.cpp in Sun Innotek VirtualBox before 2.0.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/.vbox-$USER-ipc/lock temporary file.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-59
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:virtualox:virtualox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C53F921-B24B-4D59-955D-3394BE3897D4", "versionEndIncluding": "2.0.4" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FBE8C79-C50A-4CFE-AECC-BCA142F7C6C2" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "363A5407-EA59-43C6-B9D3-960F9F8B97C8" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "874F34F3-8787-4A73-ACCD-82A90D854D67" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A37F2E63-C442-48AE-B4E2-565BEBBACEA4" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80674C86-4877-4533-A784-54DDB8F725B3" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4CCA21D-9AB1-4C94-9858-5DFAA5844E7D" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFABD1DE-0ED7-4861-9C7D-C3C0D63A302E" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7E0193E-A8C8-49CF-9DD1-80B1CE0DA9D9" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ECF9487-3E3B-456C-8D47-8EFB8BFC22D6" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0BD6DE6-D6F8-4691-A1DE-23B5E1D0CD47" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "806BCA22-C1E8-4818-93C6-41DD85F7B094" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA0BA5DE-7973-407B-9A98-2E92E215912E" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:1.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA9F576B-FC99-48E3-ABC8-55277843A004" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24E2489D-C58B-47B2-858A-B13CC77CD5C8" }, { "criteria": "cpe:2.3:a:virtualox:virtualox:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5F5C997-3B2B-4B1D-9016-18AF461CB61C" } ], "operator": "OR" } ] } ]