---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Sun VirtualBox Guest Additions Denial of Service Vulnerability SECUNIA ADVISORY ID: SA37363 VERIFY ADVISORY: http://secunia.com/advisories/37363/ DESCRIPTION: A vulnerability has been reported in Sun VirtualBox, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the VirtualBox Guest Additions and can be exploited to exhaust all available kernel memory inside a guest operating system. Successful exploitation requires that Guest Additions are installed on the guest operating system. The vulnerability is reported in the following versions: * Sun xVM VirtualBox Guest Additions 1.6 (all releases) * Sun xVM VirtualBox Guest Additions 2.0.0, 2.0.2, 2.0.4, 2.0.6, 2.0.8, 2.0.10 * Sun xVM VirtualBox Guest Additions 2.1 (all releases) * Sun xVM VirtualBox Guest Additions 2.2 (all releases) * Sun VirtualBox Additions 3.0.0, 3.0.2, 3.0.4, 3.0.6 and 3.0.8 SOLUTION: Update to Sun xVM VirtualBox version 2.0.12 or Sun VirtualBox version 3.0.10. Please see the vendor's advisory for additional information. PROVIDED AND/OR DISCOVERED BY: The vendor credits Thomas Biege of SUSE. ORIGINAL ADVISORY: http://sunsolve.sun.com/search/document.do?assetkey=1-66-271149-1 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------