#VU79697 Improper Privilege Management in QEMU - CVE-2023-0664
Published: August 18, 2023
Vulnerability identifier: #VU79697
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-0664
CWE-ID: CWE-269
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
QEMU
QEMU
Software vendor:
QEMU
QEMU
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper privilege management in the QEMU Guest Agent service for Windows. A local user can manipulate the QEMU Guest Agent's Windows installer via repair custom action and escalate privileges on the system.
Remediation
Install updates from vendor's website.
External links
- https://bugzilla.redhat.com/show_bug.cgi?id=2167423
- https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5
- https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html
- https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/
- https://security.netapp.com/advisory/ntap-20230517-0005/