Vulnerabilities > CVE-2020-2704 - Unspecified vulnerability in Oracle VM Virtualbox

047910
CVSS 6.5 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
local
low complexity
oracle
nessus

Summary

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-202004-02.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-202004-02 (VirtualBox: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details. Impact : An attacker could take control of VirtualBox resulting in the execution of arbitrary code with the privileges of the process, a Denial of Service condition, or other unspecified impacts. Workaround : There is no known workaround at this time.
    last seen2020-04-30
    modified2020-04-02
    plugin id135113
    published2020-04-02
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135113
    titleGLSA-202004-02 : VirtualBox: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 202004-02.
    #
    # The advisory text is Copyright (C) 2001-2020 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(135113);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/27");
    
      script_cve_id("CVE-2019-2926", "CVE-2019-2944", "CVE-2019-2984", "CVE-2019-3002", "CVE-2019-3005", "CVE-2019-3017", "CVE-2019-3021", "CVE-2019-3026", "CVE-2019-3028", "CVE-2019-3031", "CVE-2020-2674", "CVE-2020-2678", "CVE-2020-2681", "CVE-2020-2682", "CVE-2020-2689", "CVE-2020-2690", "CVE-2020-2691", "CVE-2020-2692", "CVE-2020-2693", "CVE-2020-2698", "CVE-2020-2702", "CVE-2020-2703", "CVE-2020-2704", "CVE-2020-2705", "CVE-2020-2725", "CVE-2020-2726", "CVE-2020-2727");
      script_xref(name:"GLSA", value:"202004-02");
    
      script_name(english:"GLSA-202004-02 : VirtualBox: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-202004-02
    (VirtualBox: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in VirtualBox. Please
          review the CVE identifiers referenced below for details.
      
    Impact :
    
        An attacker could take control of VirtualBox resulting in the execution
          of arbitrary code with the privileges of the process, a Denial of Service
          condition, or other unspecified impacts.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/202004-02"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All VirtualBox 5.2.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-5.2.36'
        All VirtualBox 6.0.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-6.0.16'
        All VirtualBox 6.1.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=app-emulation/virtualbox-6.1.2'
        All VirtualBox binary 5.2.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=app-emulation/virtualbox-bin-5.2.36'
        All VirtualBox binary 6.0.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=app-emulation/virtualbox-bin-6.0.16'
        All VirtualBox binary 6.1.x users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=app-emulation/virtualbox-bin-6.1.2'"
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-2682");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:virtualbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:virtualbox-bin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/04/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/02");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"app-emulation/virtualbox", unaffected:make_list("ge 5.2.36"), vulnerable:make_list("lt 5.2.36"))) flag++;
    if (qpkg_check(package:"app-emulation/virtualbox-bin", unaffected:make_list("ge 5.2.36"), vulnerable:make_list("lt 5.2.36"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "VirtualBox");
    }
    
  • NASL familyMisc.
    NASL idVIRTUALBOX_JAN_2020_CPU.NASL
    descriptionThe version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.36, 6.0.x prior to 6.0.16 or 6.1.x prior to 6.1.2. It is, therefore, affected by multiple vulnerabilities as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability exists in the Oracle Virtualization Core component. An authenticated, local attacker can exploit this issue, to compromise and takeover the Oracle VM VirtualBox. (CVE-2020-2674) - An unspecified vulnerability exists in the Oracle Virtualization Core component. An authenticated, local attacker can exploit this issue, for unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. (CVE-2020-2678) - A denial of service (DoS) vulnerability exists in the Oracle Virtualization Core component. An authenticated, local attacker can exploit this issue, to cause a hang or frequently repeatable crash (complete DoS) of Oracle VM VirtualBox. (CVE-2020-2703)
    last seen2020-06-01
    modified2020-06-02
    plugin id132962
    published2020-01-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132962
    titleOracle VM VirtualBox 5.2.x < 5.2.36 / 6.0.x < 6.0.16 / 6.1.x < 6.1.2 (Jan 2020 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(132962);
      script_version("1.5");
      script_cvs_date("Date: 2020/01/22");
    
      script_cve_id(
        "CVE-2020-2674",
        "CVE-2020-2678",
        "CVE-2020-2681",
        "CVE-2020-2682",
        "CVE-2020-2689",
        "CVE-2020-2690",
        "CVE-2020-2691",
        "CVE-2020-2692",
        "CVE-2020-2693",
        "CVE-2020-2698",
        "CVE-2020-2701",
        "CVE-2020-2702",
        "CVE-2020-2703",
        "CVE-2020-2704",
        "CVE-2020-2705",
        "CVE-2020-2725",
        "CVE-2020-2726",
        "CVE-2020-2727"
      );
      script_xref(name:"IAVA", value:"2020-A-0022");
    
      script_name(english:"Oracle VM VirtualBox 5.2.x < 5.2.36 / 6.0.x < 6.0.16 / 6.1.x < 6.1.2 (Jan 2020 CPU)");
      script_summary(english:"Performs a version check on VirtualBox");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.36, 6.0.x prior to 6.0.16 or 6.1.x
    prior to 6.1.2. It is, therefore, affected by multiple vulnerabilities as noted in the January 2019 Critical Patch
    Update advisory:
    
      - An unspecified vulnerability exists in the Oracle Virtualization Core component. An authenticated, local 
        attacker can exploit this issue, to compromise and takeover the Oracle VM VirtualBox. (CVE-2020-2674)
    
      - An unspecified vulnerability exists in the Oracle Virtualization Core component. An authenticated, local
        attacker can exploit this issue, for unauthorized creation, deletion or modification access to critical
        data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle
        VM VirtualBox accessible data. (CVE-2020-2678)
    
      - A denial of service (DoS) vulnerability exists in the Oracle Virtualization Core component. An
        authenticated, local attacker can exploit this issue, to cause a hang or frequently repeatable crash
        (complete DoS) of Oracle VM VirtualBox. (CVE-2020-2703)");
      # https://www.oracle.com/security-alerts/cpujan2020.html#AppendixOVIR
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bc4414d8");
      # https://www.oracle.com/security-alerts/cpujan2020verbose.html#OVIR
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2cb6a420");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Oracle VM VirtualBox version 5.2.36, 6.0.16, 6.1.2 or later as referenced in the January 2020 Oracle
    Critical Patch Update advisory.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-2682");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/01/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/01/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/16");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:vm_virtualbox");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("virtualbox_installed.nasl", "macosx_virtualbox_installed.nbin");
      script_require_ports("installed_sw/Oracle VM VirtualBox", "installed_sw/VirtualBox");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    if (get_kb_item('installed_sw/Oracle VM VirtualBox'))
      app_info = vcf::get_app_info(app:'Oracle VM VirtualBox', win_local:TRUE);
    else
      app_info = vcf::get_app_info(app:'VirtualBox');
    
    constraints = [
      {'min_version' : '5.2', 'fixed_version' : '5.2.36'},
      {'min_version' : '6.0', 'fixed_version' : '6.0.16'},
      {'min_version' : '6.1', 'fixed_version' : '6.1.2'}
    ];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);