Vulnerability Description
Multiple array index errors in programs that are automatically generated by VBox/HostServices/SharedOpenGL/crserverlib/server_dispatch.py in Oracle VirtualBox 4.2.x through 4.2.20 and 4.3.x before 4.3.8, when using 3D Acceleration, allow local guest OS users to execute arbitrary code on the Chromium server via certain CR_MESSAGE_OPCODES messages with a crafted index, which are not properly handled by the (1) CR_VERTEXATTRIB4NUBARB_OPCODE to the crServerDispatchVertexAttrib4NubARB function, (2) CR_VERTEXATTRIB1DARB_OPCODE to the crServerDispatchVertexAttrib1dARB function, (3) CR_VERTEXATTRIB1FARB_OPCODE to the crServerDispatchVertexAttrib1fARB function, (4) CR_VERTEXATTRIB1SARB_OPCODE to the crServerDispatchVertexAttrib1sARB function, (5) CR_VERTEXATTRIB2DARB_OPCODE to the crServerDispatchVertexAttrib2dARB function, (6) CR_VERTEXATTRIB2FARB_OPCODE to the crServerDispatchVertexAttrib2fARB function, (7) CR_VERTEXATTRIB2SARB_OPCODE to the crServerDispatchVertexAttrib2sARB function, (8) CR_VERTEXATTRIB3DARB_OPCODE to the crServerDispatchVertexAttrib3dARB function, (9) CR_VERTEXATTRIB3FARB_OPCODE to the crServerDispatchVertexAttrib3fARB function, (10) CR_VERTEXATTRIB3SARB_OPCODE to the crServerDispatchVertexAttrib3sARB function, (11) CR_VERTEXATTRIB4DARB_OPCODE to the crServerDispatchVertexAttrib4dARB function, (12) CR_VERTEXATTRIB4FARB_OPCODE to the crServerDispatchVertexAttrib4fARB function, and (13) CR_VERTEXATTRIB4SARB_OPCODE to the crServerDispatchVertexAttrib4sARB function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Vm Virtualbox | 4.2.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2014/Mar/95Exploit
- http://secunia.com/advisories/57384Vendor Advisory
- http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiplExploit
- http://www.debian.org/security/2014/dsa-2904
- http://www.exploit-db.com/exploits/32208
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.securityfocus.com/archive/1/531418/100/0/threaded
- https://security.gentoo.org/glsa/201612-27
- https://www.virtualbox.org/changeset/50441/vbox
- http://seclists.org/fulldisclosure/2014/Mar/95Exploit
- http://secunia.com/advisories/57384Vendor Advisory
- http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiplExploit
- http://www.debian.org/security/2014/dsa-2904
- http://www.exploit-db.com/exploits/32208
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
FAQ
What is CVE-2014-0983?
CVE-2014-0983 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Multiple array index errors in programs that are automatically generated by VBox/HostServices/SharedOpenGL/crserverlib/server_dispatch.py in Oracle VirtualBox 4.2.x through 4.2.20 and 4.3.x before 4.3...
How severe is CVE-2014-0983?
CVE-2014-0983 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0983?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Vm Virtualbox.