Bug 1208531 (CVE-2023-0664) - VUL-0: CVE-2023-0664: vmdp: local privilege escalation via the QEMU Guest Agent on Windows
Summary: VUL-0: CVE-2023-0664: vmdp: local privilege escalation via the QEMU Guest Age...
Status: RESOLVED FIXED
Alias: CVE-2023-0664
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/357835/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-02-21 13:24 UTC by Robert Frohl
Modified: 2024-05-06 08:12 UTC (History)
6 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2023-02-21 13:24:58 UTC
CVE-2023-0664

A privilege escalation vulnerability was found in the QEMU Guest Agent service for Windows. A local unprivileged user is able to manipulate the QEMU Guest Agent's Windows installer (via repair custom actions) to elevate their privileges to the SYSTEM account within the guest.

Note: this is not a VM escape flaw, meaning that it does *not* allow a malicious user to break out of the guest. It affects Windows VMs using virtio-win drivers with QEMU Guest Agent installed in the guest.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0664
https://bugzilla.redhat.com/show_bug.cgi?id=2167423
Comment 8 Robert Frohl 2023-02-24 08:47:39 UTC
affects the Virtual Machine Driver Pack [0].

[0] https://documentation.suse.com/sle-vmdp/2.5/html/vmdp/index.html
Comment 10 Kirk Allan 2023-08-31 21:07:47 UTC
The qemu-ga with the patches applied is now available in the released and community versions of vmdp 2.5.4.2.

Reassigning back to the security team.
Comment 11 Robert Frohl 2024-05-06 08:12:29 UTC
done, closing