Description
pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
Exploits
306202007-09-22localLinux
Xen 3.0.3 - pygrub TOOLS/PYGRUB/SRC/GRUBCONF.PY Local Command Injection
By Joris van Rantwijk
References
secalert@redhat.com
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068secalert@redhat.com
http://secunia.com/advisories/26986secalert@redhat.com
http://secunia.com/advisories/27047secalert@redhat.com
http://secunia.com/advisories/27072secalert@redhat.com
http://secunia.com/advisories/27085secalert@redhat.com
http://secunia.com/advisories/27103secalert@redhat.com
http://secunia.com/advisories/27141secalert@redhat.com
http://secunia.com/advisories/27161secalert@redhat.com
http://secunia.com/advisories/27486secalert@redhat.com
http://www.debian.org/security/2007/dsa-1384secalert@redhat.com
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203secalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2007-0323.htmlsecalert@redhat.com
http://www.securityfocus.com/archive/1/481825/100/0/threadedsecalert@redhat.com
http://www.securityfocus.com/bid/25825secalert@redhat.com
http://www.ubuntu.com/usn/usn-527-1secalert@redhat.com
http://www.vupen.com/english/advisories/2007/3348secalert@redhat.com
https://issues.rpath.com/browse/RPL-1752secalert@redhat.com
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240secalert@redhat.com
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.htmlsecalert@redhat.com
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.htmlsecalert@redhat.com
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.htmlaf854a3a-2127-422b-91ae-364da2661108
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26986af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27047af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27072af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27085af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27103af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27141af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27161af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27486af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1384af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0323.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/481825/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25825af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-527-1af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3348af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1752af854a3a-2127-422b-91ae-364da2661108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240af854a3a-2127-422b-91ae-364da2661108
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00030.htmlaf854a3a-2127-422b-91ae-364da2661108
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html