
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-4949 is a security vulnerability in GRUB's XFS filesystem implementation that was discovered in 2023. The vulnerability affects GNU GRUB versions up to and including 0.97. An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy to exploit a memory corruption in GRUB's XFS file system implementation (NVD).
The vulnerability is classified as an Out-of-bounds Write (CWE-787) with additional categorizations including Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) and Integer Overflow or Wraparound (CWE-190). The CVSS v3.1 base score is rated as 6.7 (Medium) by NIST and 8.1 (High) by Google Inc., with the vector string CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability allows an attacker with local access to exploit memory corruption in the XFS filesystem implementation, potentially leading to privilege escalation. When implemented in systems like Xen's libfsimage, it can allow a guest to escalate privileges to that of the domain construction tools, effectively gaining control of the host (Xen Advisory).
For systems using Xen, mitigations include ensuring guests do not use the pygrub bootloader, using pvgrub as an alternative for 64-bit PV guests with grub2, or running only HVM guests. Patches have been released to resolve the libfsimage XFS stack overflow and add functionality to run pygrub in a restricted environment using a specific UID (Xen Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."