vendor:
VirtualBox
by:
Renorobert
8.8
CVSS
HIGH
Double Fetch Vulnerability in VirtualBox Video Acceleration (VBVA) feature
119
CWE
Product Name: VirtualBox
Affected Version From: VirtualBox 5.2.6.r120293
Affected Version To: VirtualBox 5.2.6.r120293
Patch Exists: YES
Related CWE: CVE-2018-2844
CPE: a:oracle:virtualbox
Other Scripts:
N/A
Platforms Tested: Linux
2018
From Compiler Optimization to Code Execution in Oracle VirtualBox
Oracle fixed some of the issues reported in VirtualBox during the Oracle Critical Patch Update - April 2018. CVE-2018-2844 was an interesting double fetch vulnerability in VirtualBox Video Acceleration (VBVA) feature affecting Linux hosts. VBVA feature works on top of VirtualBox Host-Guest Shared Memory Interface (HGSMI), a shared memory implemented using Video RAM buffer. The VRAM buffer is at physical address 0xE0000000. The exploit was tested with Ubuntu Server as Guest and Ubuntu Desktop as host running VirtualBox 5.2.6.r120293. The proof-of-concept exploit code with process continuation and connect back over network can be found at virtualbox-cve-2018-2844.
Mitigation:
Blacklisting vboxvideo reduces activity on VRAM and keeps the payload intact.