SB20230818181 - Privilege escalation in QEMU Guest Agent service for Windows
Published: August 18, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper Privilege Management (CVE-ID: CVE-2023-0664)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper privilege management in the QEMU Guest Agent service for Windows. A local user can manipulate the QEMU Guest Agent's Windows installer via repair custom action and escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2167423
- https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5
- https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html
- https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/
- https://security.netapp.com/advisory/ntap-20230517-0005/