This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2004-03-03
Product Virtual Pc Last view 2010-04-01
Version 2004 Type
Update sp1  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:microsoft:virtual_pc:6.1:*:mac:*:*:*:*:* 2
cpe:2.3:a:microsoft:virtual_pc:2007:*:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:virtual_pc:2007:sp1:*:*:*:*:*:* 2
cpe:2.3:a:microsoft:virtual_pc:6.2:*:mac:*:*:*:*:* 1
cpe:2.3:a:microsoft:virtual_pc:6.0:*:mac:*:*:*:*:* 1
cpe:2.3:a:microsoft:virtual_pc:2004:*:*:*:*:*:*:* 1
cpe:2.3:a:microsoft:virtual_pc:7:*:mac:*:*:*:*:* 1
cpe:2.3:a:microsoft:virtual_pc:2004:sp1:*:*:*:*:*:* 1
cpe:2.3:a:microsoft:virtual_pc:2007:*:x64:*:*:*:*:* 1

Related : CVE

  Date Alert Description
9.3 2010-04-01 CVE-2010-1225

The memory-management implementation in the Virtual Machine Monitor (aka VMM or hypervisor) in Microsoft Virtual PC 2007 Gold and SP1, Virtual Server 2005 Gold and R2 SP1, and Windows Virtual PC does not properly restrict access from the guest OS to memory locations in the VMM work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest OS via crafted input to a vulnerable application. NOTE: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because "the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest OS."

9 2009-07-15 CVE-2009-1542

The Virtual Machine Monitor (VMM) in Microsoft Virtual PC 2004 SP1, 2007, and 2007 SP1, and Microsoft Virtual Server 2005 R2 SP1, does not enforce CPU privilege-level requirements for all machine instructions, which allows guest OS users to execute arbitrary kernel-mode code and gain privileges within the guest OS via a crafted application, aka "Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability."

9.3 2007-08-14 CVE-2007-0948

Heap-based buffer overflow in Microsoft Virtual PC 2004 and PC for Mac 7.1 and 7, and Virtual Server 2005 and 2005 R2, allows local guest OS administrators to execute arbitrary code on the host OS via unspecified vectors related to "interaction and initialization of components."

4.6 2004-03-03 CVE-2004-0115

VirtualPC_Services in Microsoft Virtual PC for Mac 6.0 through 6.1 allows local attackers to truncate and overwrite arbitrary files, and execute arbitrary code, via a symlink attack on the VPCServices_Log temporary file.

CWE : Common Weakness Enumeration

%idName
100% (2) CWE-264 Permissions, Privileges, and Access Controls

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:1259 Virtual PC and Virtual Server Heap Overflow Vulnerability
oval:org.mitre.oval:def:6166 Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability

Open Source Vulnerability Database (OSVDB)

id Description
63522 Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Manag...
55837 Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local ...
36389 Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
3893 Microsoft Virtual PC for Mac Insecure Temporary Files Creation

OpenVAS Exploits

id Description
2009-07-15 Name : Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
File : nvt/secpod_ms09-033.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2007-T-0031 Microsoft Virtual PC and Virtual Server Elevation of Privilege Vulnerability
Severity: Category II - VMSKEY: V0014835

Nessus® Vulnerability Scanner

id Description
2009-07-14 Name: The remote host contains an application that is affected by a privilege escal...
File: smb_nt_ms09-033.nasl - Type: ACT_GATHER_INFO
2007-08-16 Name: A user can elevate his privileges on the virtual system.
File: smb_nt_ms07-049.nasl - Type: ACT_GATHER_INFO