Kaspersky ID:
KLA11179
Detect Date:
01/18/2018
Updated:
05/07/2024

Description

Multiple serious vulnerabilities have been found in Oracle VM VirtualBox. Malicious users can exploit these vulnerabilities to obtain sensitive information and gain privileges.

Below is a complete list of vulnerabilities:

  1. Multiple unspecified vulnerabilities in Core subcomponent of Oracle Virtualization can be exploited locally to gain privileges and possibly to obtain sensitive information;
  2. An unspecified vulnerability in Guest Additions subcomponent of Oracle Virtualization can be exploited locally to gain privileges and possibly to obtain sensitive information;
  3. Vulnerability in OpenSSL component of Oracle VM VirtualBox can be exploited remotely via using a carry propagation flaw in the x86_64 Montgomery squaring function to obtain sensitive information about the SSL private keys.

Technical details

Vulnerability (3) affects only OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g on the processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2017-5715
    high
  • CVE-2018-2676
    critical
  • CVE-2017-3736
    high
  • CVE-2018-2685
    critical
  • CVE-2018-2686
    critical
  • CVE-2018-2687
    critical
  • CVE-2018-2688
    critical
  • CVE-2018-2689
    critical
  • CVE-2018-2690
    critical
  • CVE-2018-2693
    critical
  • CVE-2018-2694
    critical
  • CVE-2018-2698
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.