Description
Buffer overflow in Bochs before 2.1.1, if installed setuid, allows local users to execute arbitrary code via a long HOME environment variable, which is used if the .bochsrc, bochsrc, and bochsrc.txt cannot be found in a known path. NOTE: some external documents recommend that Bochs be installed setuid root, so this should be treated as a vulnerability.
Product(s):
- Bochs Project Bochs
- Bochs Project Bochs 1.0
- Bochs Project Bochs 1.1.1
- Bochs Project Bochs 1.1.2
- Bochs Project Bochs 1.1
- Bochs Project Bochs 1.2.1
- Bochs Project Bochs 1.2
- Bochs Project Bochs 1.2 Pre 1
- Bochs Project Bochs 1.3
- Bochs Project Bochs 1.3 Pre 1
- Bochs Project Bochs 1.4.1
- Bochs Project Bochs 1.4
- Bochs Project Bochs 1.4 Pre 1
- Bochs Project Bochs 1.4 Pre 2
- Bochs Project Bochs 2.0.1
- Bochs Project Bochs 2.0.2
- Bochs Project Bochs 2.0
- Bochs Project Bochs 2.0 Pre 1
- Bochs Project Bochs 2.0 Pre 2
- Bochs Project Bochs 2.0 Pre 3
- Bochs Project Bochs 2.0 Pre 4
- Bochs Project Bochs 2.1
- Bochs Project Bochs 2.1 Pre 1
- Bochs Project Bochs 2.1 Pre 2
- Bochs Project Bochs 2.1 Pre 3
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-2372, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-2372 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.