6.9
CVE-2009-0876
- EPSS 0.3%
- Published 12.03.2009 15:20:49
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Sun xVM VirtualBox 2.0.0, 2.0.2, 2.0.4, 2.0.6r39760, 2.1.0, 2.1.2, and 2.1.4r42893 on Linux allows local users to gain privileges via a hardlink attack, which preserves setuid/setgid bits on Linux, related to DT_RPATH:$ORIGIN.
Data is provided by the National Vulnerability Database (NVD)
Sun ≫ Xvm Virtualbox Version2.0.0
Sun ≫ Xvm Virtualbox Version2.0.2
Sun ≫ Xvm Virtualbox Version2.0.4
Sun ≫ Xvm Virtualbox Version2.0.6r39760
Sun ≫ Xvm Virtualbox Version2.1.0
Sun ≫ Xvm Virtualbox Version2.1.2
Sun ≫ Xvm Virtualbox Version2.1.4r42893
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.3% | 0.501 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.9 | 3.4 | 10 |
AV:L/AC:M/Au:N/C:C/I:C/A:C
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.