High severity8.8CISA KEVNVD Advisory· Published Aug 5, 2008· Updated Apr 22, 2026
CVE-2008-3431
CVE-2008-3431
Description
The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerabilitynvdExploitThird Party Advisory
- www.securityfocus.com/bid/30481nvdBroken LinkExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/6218nvdExploitThird Party AdvisoryVDB Entry
- secunia.com/advisories/31361nvdBroken LinkVendor Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/495095/100/0/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/44202nvdThird Party AdvisoryVDB Entry
- securityreason.com/securityalert/4107nvdBroken Link
- sunsolve.sun.com/search/document.donvdBroken Link
- virtualbox.org/wiki/ChangelognvdProduct
- www.vupen.com/english/advisories/2008/2293nvdBroken Link
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.