English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 76783 CVE descriptions
and 40246 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.801142
Category:Privilege escalation
Title:VMware Products Guest Privilege Escalation Vulnerability - Nov09 (Win)
Summary:Check for the version of VMware Products
Description:
Overview: The host is installed with VMWare product(s) and is prone to
Privilege Escalation vulnerability.

Vulnerability Insight:
An error occurs while setting the exception code when a '#PF' (page fault)
exception arises which can be exploited to gain escalated privileges within
VMware guest.

Impact:
Local attacker can exploit this issue to gain escalated privileges in a guest
virtual machine.

Impact Level: System

Affected Software/OS:
VMware ACE version 2.5.x prior to 2.5.3 Build 185404,
VMware Server version 2.0.x prior to 2.0.2 Build 203138,
VMware Server version 1.0.x prior to 1.0.10 Build 203137,
VMware Player version 2.5.x prior to 2.5.3 Build 185404,
VMware Workstation version 6.5.x prior to 6.5.3 Build 185404 on Windows.

Fix: Upgrade your VMWares according to the below link,
http://www.vmware.com/security/advisories/VMSA-2009-0015.html

References:
http://secunia.com/advisories/37172
http://www.vupen.com/english/advisories/2009/3062
http://securitytracker.com/alerts/2009/Oct/1023082.html
http://lists.vmware.com/pipermail/security-announce/2009/000069.html
Cross-Ref: BugTraq ID: 36841
Common Vulnerability Exposure (CVE) ID: CVE-2009-2267
Bugtraq: 20091027 Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507539/100/0/threaded
Bugtraq: 20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507523/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2009/000069.html
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://www.securityfocus.com/bid/36841
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8473
http://securitytracker.com/id?1023082
http://securitytracker.com/id?1023083
http://secunia.com/advisories/37172
http://www.vupen.com/english/advisories/2009/3062
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.