CNVD-2021-03037

Vulnerability from cnvd - Published: 2021-01-14
VLAI Severity ?
Title
Bitdefender Hypervisor Introspection代码执行漏洞
Description
Bidefender Hypervisor Introspection(HVI)是罗马尼亚Bidefender公司的一款处于Hypervisor层利用Xen和KVM虚拟机管理程序中的虚拟机自检API来检查运行中的虚拟机内存安全的软件。该软件通过虚拟化内存管理单元(MMU)的扩展页表(EPT)级别来阻止异常内存内的代码执行,通过应用安全逻辑,HVI搜索攻击技术,例如缓冲区溢出,堆喷射和代码注入,以在攻击者获得目标系统的立足点之前检测并阻止恶意活动。 Bitdefender Hypervisor Introspection 1.132.2之前版本存在代码执行漏洞,该漏洞源于IntPeParseUnwindData()中的编译器优化删除或修改安全关键代码漏洞会导致对同一指针的多次解引用。这可能导致任意代码执行。目前没有详细漏洞细节提供。
Severity
Patch Name
Bitdefender Hypervisor Introspection代码执行漏洞的补丁
Patch Description
Bidefender Hypervisor Introspection(HVI)是罗马尼亚Bidefender公司的一款处于Hypervisor层利用Xen和KVM虚拟机管理程序中的虚拟机自检API来检查运行中的虚拟机内存安全的软件。该软件通过虚拟化内存管理单元(MMU)的扩展页表(EPT)级别来阻止异常内存内的代码执行,通过应用安全逻辑,HVI搜索攻击技术,例如缓冲区溢出,堆喷射和代码注入,以在攻击者获得目标系统的立足点之前检测并阻止恶意活动。 Bitdefender Hypervisor Introspection 1.132.2之前版本存在代码执行漏洞,该漏洞源于IntPeParseUnwindData()中的编译器优化删除或修改安全关键代码漏洞会导致对同一指针的多次解引用。这可能导致任意代码执行。目前没有详细漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新:https://www.bitdefender.com/support/security-advisories/compiler-optimization-removal-modification-security-critical-code-vulnerability-bitdefender-hypervisor-introspection-va-9339/

Reference
https://nvd.nist.gov/vuln/detail/CVE-2020-15294
Impacted products
Name
Bitdefender Bitdefender Hypervisor Introspection <1.132.2
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-15294",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-15294"
    }
  },
  "description": "Bidefender Hypervisor Introspection\uff08HVI\uff09\u662f\u7f57\u9a6c\u5c3c\u4e9aBidefender\u516c\u53f8\u7684\u4e00\u6b3e\u5904\u4e8eHypervisor\u5c42\u5229\u7528Xen\u548cKVM\u865a\u62df\u673a\u7ba1\u7406\u7a0b\u5e8f\u4e2d\u7684\u865a\u62df\u673a\u81ea\u68c0API\u6765\u68c0\u67e5\u8fd0\u884c\u4e2d\u7684\u865a\u62df\u673a\u5185\u5b58\u5b89\u5168\u7684\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u901a\u8fc7\u865a\u62df\u5316\u5185\u5b58\u7ba1\u7406\u5355\u5143\uff08MMU\uff09\u7684\u6269\u5c55\u9875\u8868\uff08EPT\uff09\u7ea7\u522b\u6765\u963b\u6b62\u5f02\u5e38\u5185\u5b58\u5185\u7684\u4ee3\u7801\u6267\u884c\uff0c\u901a\u8fc7\u5e94\u7528\u5b89\u5168\u903b\u8f91\uff0cHVI\u641c\u7d22\u653b\u51fb\u6280\u672f\uff0c\u4f8b\u5982\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u5806\u55b7\u5c04\u548c\u4ee3\u7801\u6ce8\u5165\uff0c\u4ee5\u5728\u653b\u51fb\u8005\u83b7\u5f97\u76ee\u6807\u7cfb\u7edf\u7684\u7acb\u8db3\u70b9\u4e4b\u524d\u68c0\u6d4b\u5e76\u963b\u6b62\u6076\u610f\u6d3b\u52a8\u3002\n\nBitdefender Hypervisor Introspection 1.132.2\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eIntPeParseUnwindData()\u4e2d\u7684\u7f16\u8bd1\u5668\u4f18\u5316\u5220\u9664\u6216\u4fee\u6539\u5b89\u5168\u5173\u952e\u4ee3\u7801\u6f0f\u6d1e\u4f1a\u5bfc\u81f4\u5bf9\u540c\u4e00\u6307\u9488\u7684\u591a\u6b21\u89e3\u5f15\u7528\u3002\u8fd9\u53ef\u80fd\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1ahttps://www.bitdefender.com/support/security-advisories/compiler-optimization-removal-modification-security-critical-code-vulnerability-bitdefender-hypervisor-introspection-va-9339/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-03037",
  "openTime": "2021-01-14",
  "patchDescription": "Bidefender Hypervisor Introspection\uff08HVI\uff09\u662f\u7f57\u9a6c\u5c3c\u4e9aBidefender\u516c\u53f8\u7684\u4e00\u6b3e\u5904\u4e8eHypervisor\u5c42\u5229\u7528Xen\u548cKVM\u865a\u62df\u673a\u7ba1\u7406\u7a0b\u5e8f\u4e2d\u7684\u865a\u62df\u673a\u81ea\u68c0API\u6765\u68c0\u67e5\u8fd0\u884c\u4e2d\u7684\u865a\u62df\u673a\u5185\u5b58\u5b89\u5168\u7684\u8f6f\u4ef6\u3002\u8be5\u8f6f\u4ef6\u901a\u8fc7\u865a\u62df\u5316\u5185\u5b58\u7ba1\u7406\u5355\u5143\uff08MMU\uff09\u7684\u6269\u5c55\u9875\u8868\uff08EPT\uff09\u7ea7\u522b\u6765\u963b\u6b62\u5f02\u5e38\u5185\u5b58\u5185\u7684\u4ee3\u7801\u6267\u884c\uff0c\u901a\u8fc7\u5e94\u7528\u5b89\u5168\u903b\u8f91\uff0cHVI\u641c\u7d22\u653b\u51fb\u6280\u672f\uff0c\u4f8b\u5982\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u5806\u55b7\u5c04\u548c\u4ee3\u7801\u6ce8\u5165\uff0c\u4ee5\u5728\u653b\u51fb\u8005\u83b7\u5f97\u76ee\u6807\u7cfb\u7edf\u7684\u7acb\u8db3\u70b9\u4e4b\u524d\u68c0\u6d4b\u5e76\u963b\u6b62\u6076\u610f\u6d3b\u52a8\u3002\r\n\r\nBitdefender Hypervisor Introspection 1.132.2\u4e4b\u524d\u7248\u672c\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eIntPeParseUnwindData()\u4e2d\u7684\u7f16\u8bd1\u5668\u4f18\u5316\u5220\u9664\u6216\u4fee\u6539\u5b89\u5168\u5173\u952e\u4ee3\u7801\u6f0f\u6d1e\u4f1a\u5bfc\u81f4\u5bf9\u540c\u4e00\u6307\u9488\u7684\u591a\u6b21\u89e3\u5f15\u7528\u3002\u8fd9\u53ef\u80fd\u5bfc\u81f4\u4efb\u610f\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Bitdefender Hypervisor Introspection\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Bitdefender Bitdefender Hypervisor Introspection \u003c1.132.2"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-15294",
  "serverity": "\u4e2d",
  "submitTime": "2020-12-18",
  "title": "Bitdefender Hypervisor Introspection\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…