Source: virtualbox
Version: 7.0.20-dfsg-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for virtualbox.

CVE-2024-21248[0]:
| Vulnerability in the Oracle VM VirtualBox product of Oracle
| Virtualization (component: Core).  Supported versions that are
| affected are Prior to 7.0.22 and  prior to 7.1.2. Difficult to
| exploit vulnerability allows low privileged attacker with logon to
| the infrastructure where Oracle VM VirtualBox executes to compromise
| Oracle VM VirtualBox.  While the vulnerability is in Oracle VM
| VirtualBox, attacks may significantly impact additional products
| (scope change).  Successful attacks of this vulnerability can result
| in  unauthorized update, insert or delete access to some of Oracle
| VM VirtualBox accessible data as well as  unauthorized read access
| to a subset of Oracle VM VirtualBox accessible data and unauthorized
| ability to cause a partial denial of service (partial DOS) of Oracle
| VM VirtualBox. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity
| and Availability impacts).  CVSS Vector:
| (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L).


CVE-2024-21253[1]:
| Vulnerability in the Oracle VM VirtualBox product of Oracle
| Virtualization (component: Core).  Supported versions that are
| affected are Prior to 7.0.22. Easily exploitable vulnerability
| allows high privileged attacker with logon to the infrastructure
| where Oracle VM VirtualBox executes to compromise Oracle VM
| VirtualBox.  Successful attacks of this vulnerability can result in
| unauthorized ability to cause a partial denial of service (partial
| DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 2.3 (Availability
| impacts).  CVSS Vector:
| (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).


CVE-2024-21259[2]:
| Vulnerability in the Oracle VM VirtualBox product of Oracle
| Virtualization (component: Core).  Supported versions that are
| affected are Prior to 7.0.22 and  prior to 7.1.2. Difficult to
| exploit vulnerability allows high privileged attacker with logon to
| the infrastructure where Oracle VM VirtualBox executes to compromise
| Oracle VM VirtualBox.  While the vulnerability is in Oracle VM
| VirtualBox, attacks may significantly impact additional products
| (scope change).  Successful attacks of this vulnerability can result
| in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5
| (Confidentiality, Integrity and Availability impacts).  CVSS Vector:
| (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).


CVE-2024-21263[3]:
| Vulnerability in the Oracle VM VirtualBox product of Oracle
| Virtualization (component: Core).  Supported versions that are
| affected are Prior to 7.0.22 and  prior to 7.1.2. Easily exploitable
| vulnerability allows low privileged attacker with logon to the
| infrastructure where Oracle VM VirtualBox executes to compromise
| Oracle VM VirtualBox.  Successful attacks of this vulnerability can
| result in unauthorized ability to cause a hang or frequently
| repeatable crash (complete DOS) of Oracle VM VirtualBox and
| unauthorized read access to a subset of Oracle VM VirtualBox
| accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and
| Availability impacts).  CVSS Vector:
| (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H).


CVE-2024-21273[4]:
| Vulnerability in the Oracle VM VirtualBox product of Oracle
| Virtualization (component: Core).  Supported versions that are
| affected are Prior to 7.0.22 and  prior to 7.1.2. Easily exploitable
| vulnerability allows high privileged attacker with logon to the
| infrastructure where Oracle VM VirtualBox executes to compromise
| Oracle VM VirtualBox.  While the vulnerability is in Oracle VM
| VirtualBox, attacks may significantly impact additional products
| (scope change).  Successful attacks of this vulnerability can result
| in  unauthorized access to critical data or complete access to all
| Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0
| (Confidentiality impacts).  CVSS Vector:
| (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-21248
    https://www.cve.org/CVERecord?id=CVE-2024-21248
[1] https://security-tracker.debian.org/tracker/CVE-2024-21253
    https://www.cve.org/CVERecord?id=CVE-2024-21253
[2] https://security-tracker.debian.org/tracker/CVE-2024-21259
    https://www.cve.org/CVERecord?id=CVE-2024-21259
[3] https://security-tracker.debian.org/tracker/CVE-2024-21263
    https://www.cve.org/CVERecord?id=CVE-2024-21263
[4] https://security-tracker.debian.org/tracker/CVE-2024-21273
    https://www.cve.org/CVERecord?id=CVE-2024-21273

Regards,
Salvatore

Reply via email to