This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. In addition, some user interaction is required on the part of a user on the host. The specific flaw exists within Guest Additions. The issue results from improper access control when performing upgrade operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root on the target guest system.