![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.800006 |
Category: | Privilege escalation |
Title: | VMware Products Local Privilege Escalation Vulnerability (VMSA-2008-0009) |
Summary: | VMWare product(s) are prone to a local privilege escalation vulnerability. |
Description: | Summary: VMWare product(s) are prone to a local privilege escalation vulnerability. Vulnerability Insight: Issue is due to local exploitation of an untrusted library path in vmware-authd. VMware VIX API (Application Program Interface) fails to adequately bounds check user supplied input before copying it to insufficient size buffer. Vulnerability Impact: Successful exploitation could result in arbitrary code execution on linux based host system by an unprivileged user and can also crash the application. Local access is required in order to execute the set-uid vmware-authd and Also, vix.inGuest.enable configuration must be set. Affected Software/OS: VMware Player 1.x - before 1.0.7 build 91707 on Linux VMware Player 2.x - before 2.0.4 build 93057 on Linux VMware Server 1.x - before 1.0.6 build 91891 on Linux VMware Workstation 5.x - before 5.5.7 build 91707 on Linux VMware Workstation 6.x - before 6.0.4 build 93057 on Linux Solution: Upgrade VMware Product(s) to below version, VMware Player 1.0.7 build 91707 or 2.0.4 build 93057 or later VMware Server 1.0.6 build 91891 or later VMware Workstation 5.5.7 build 91707 or 6.0.4 build 93057 or later. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-0967 BugTraq ID: 29557 http://www.securityfocus.com/bid/29557 Bugtraq: 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (Google Search) http://www.securityfocus.com/archive/1/493080/100/0/threaded http://security.gentoo.org/glsa/glsa-201209-25.xml http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583 http://securitytracker.com/id?1020198 http://secunia.com/advisories/30556 http://securityreason.com/securityalert/3922 http://www.vupen.com/english/advisories/2008/1744 XForce ISS Database: vmware-vmwareauthd-privilege-escalation(42878) https://exchange.xforce.ibmcloud.com/vulnerabilities/42878 Common Vulnerability Exposure (CVE) ID: CVE-2008-2100 BugTraq ID: 29552 http://www.securityfocus.com/bid/29552 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647 http://securitytracker.com/id?1020200 XForce ISS Database: vmware-vixapi-multiple-unspecified-bo(42872) https://exchange.xforce.ibmcloud.com/vulnerabilities/42872 |
Copyright | Copyright (C) 2008 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |