Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2004-03-03 |
Product | Virtual Pc | Last view | 2010-04-01 |
Version | 2004 | Type | |
Update | sp1 | ||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2010-04-01 | CVE-2010-1225 | The memory-management implementation in the Virtual Machine Monitor (aka VMM or hypervisor) in Microsoft Virtual PC 2007 Gold and SP1, Virtual Server 2005 Gold and R2 SP1, and Windows Virtual PC does not properly restrict access from the guest OS to memory locations in the VMM work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest OS via crafted input to a vulnerable application. NOTE: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because "the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest OS." |
9 | 2009-07-15 | CVE-2009-1542 | The Virtual Machine Monitor (VMM) in Microsoft Virtual PC 2004 SP1, 2007, and 2007 SP1, and Microsoft Virtual Server 2005 R2 SP1, does not enforce CPU privilege-level requirements for all machine instructions, which allows guest OS users to execute arbitrary kernel-mode code and gain privileges within the guest OS via a crafted application, aka "Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability." |
9.3 | 2007-08-14 | CVE-2007-0948 | Heap-based buffer overflow in Microsoft Virtual PC 2004 and PC for Mac 7.1 and 7, and Virtual Server 2005 and 2005 R2, allows local guest OS administrators to execute arbitrary code on the host OS via unspecified vectors related to "interaction and initialization of components." |
4.6 | 2004-03-03 | CVE-2004-0115 | VirtualPC_Services in Microsoft Virtual PC for Mac 6.0 through 6.1 allows local attackers to truncate and overwrite arbitrary files, and execute arbitrary code, via a symlink attack on the VPCServices_Log temporary file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:1259 | Virtual PC and Virtual Server Heap Overflow Vulnerability |
oval:org.mitre.oval:def:6166 | Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
63522 | Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Manag... |
55837 | Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local ... |
36389 | Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation |
3893 | Microsoft Virtual PC for Mac Insecure Temporary Files Creation |
OpenVAS Exploits
id | Description |
---|---|
2009-07-15 | Name : Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856) File : nvt/secpod_ms09-033.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2007-T-0031 | Microsoft Virtual PC and Virtual Server Elevation of Privilege Vulnerability Severity: Category II - VMSKEY: V0014835 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2009-07-14 | Name: The remote host contains an application that is affected by a privilege escal... File: smb_nt_ms09-033.nasl - Type: ACT_GATHER_INFO |
2007-08-16 | Name: A user can elevate his privileges on the virtual system. File: smb_nt_ms07-049.nasl - Type: ACT_GATHER_INFO |