QEMU: user-to-root privesc inside VM...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

This is a security issue in QEMU's system emulation for X86. The issue permits an attacker who can execute code in guest ring 3 with normal user privileges to inject code into other processes that are running in guest ring 3, in particular root-owned processes. #### == reproduction steps == - Create an x86-64 VM and install Debian Jessie in it. The following steps should all be executed inside the VM. - Verify that procmail is installed and the correct version: root@qemuvm:~# apt-cache show procmail | egrep 'Version|SHA' Version: 3.22-24 SHA1: 54ed2d51db0e76f027f06068ab5371048c13434c SHA256: 4488cf6975af9134a9b5238d5d70e8be277f70caa45a840dfbefd2dc444bfe7f - Install build-essential and nasm ("apt install build-essential nasm"). - Unpack the exploit, compile it and run it: ``` user@qemuvm:~$ tar xvf procmail_cache_attack.tar procmail_cache_attack/ procmail_cache_attack/shellcode.asm procmail_cache_attack/xp.c procmail_cache_attack/compile.sh procmail_cache_attack/attack.c...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息