CVE-2023-0664
Published on: Not Yet Published
Last Modified on: 08/29/2023 03:15:00 AM UTC
Certain versions of Fedora from Fedoraproject contain the following vulnerability:
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
- CVE-2023-0664 has been assigned by
seca[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
qga/win32: Use rundll for VSS installation (07ce178a) · Commits · QEMU / QEMU · GitLab | gitlab.com text/html |
![]() |
[PATCH v3 0/2] QGA installer fixes | lists.nongnu.org text/html |
![]() |
[SECURITY] Fedora 38 Update: qemu-7.2.1-2.fc38 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
2167423 – (CVE-2023-0664) CVE-2023-0664 QEMU: local privilege escalation via the QEMU Guest Agent on Windows | bugzilla.redhat.com text/html |
![]() |
[SECURITY] Fedora 38 Update: qemu-7.2.5-1.fc38 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
CVE-2023-0664 QEMU Vulnerability in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
qga/win32: Remove change action from MSI installer (88288c2a) · Commits · QEMU / QEMU · GitLab | gitlab.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Fedoraproject | Fedora | 37 | All | All | All |
Operating System | Microsoft | Windows | - | All | All | All |
Application | Qemu | Qemu | All | All | All | All |
Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux | 8.0 | All | All | All |
Operating System | Redhat | Enterprise Linux | 9.0 | All | All | All |
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*:
- cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*:
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-0664 : A flaw was found in the QEMU Guest Agent service for #Windows. A local unprivileged user may be abl… twitter.com/i/web/status/1… | 2023-03-29 20:06:00 |