|Title:||Oracle VirtualBox Guest-to-Host Escape E1000 Privilege Escalation Vulnerability (Mac OS X)|
|Summary:||The host is installed with Oracle VirtualBox; and is prone to privilege escalation vulnerability.|
The host is installed with Oracle VirtualBox
and is prone to privilege escalation vulnerability.
The flaw exists in the Intel PRO/1000 MT
Desktop (82540EM) network adapter in Network Address Translation (NAT) mode
called the E1000.
Successful exploitation will allow an attacker
with root/administrator privileges in a guest to escape to a host ring3. Then the
attacker can use existing techniques to escalate privileges to ring 0 via
Oracle VirtualBox versions 5.2.20 and
before on Mac OS X.
No known solution is available as of 09th
November, 2018. Information regarding this issue will be updated once solution
details are available. For updates refer to Reference links.
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.