Vulnerability CVE-2007-1056


Published: 2007-02-21   Modified: 2012-02-12

Description:
VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, accessing hardware components, and stopping the "VMware tools service" service. NOTE: exploitation is simplified via (1) weak file permissions (Users = Read & Execute) for %PROGRAMFILES%\VMware; and weak registry key permissions (access by Users) for (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga, and (6) vmxnet in HKLM\SYSTEM\CurrentControlSet\Services\; which allows local users to perform various privileged actions outside of the guest OS by executing certain files under %PROGRAMFILES%\VMware\VMware Tools, as demonstrated by (a) VMControlPanel.cpl and (b) vmwareservice.exe.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
VMware Workstation multiple denial of service and isolation manipulation vulnerabilities
EitanCaspi
23.02.2007

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Vmware -> Workstation 

 References:
http://securityreason.com/securityalert/2281
http://www.securityfocus.com/archive/1/460664/100/0/threaded
http://www.securityfocus.com/archive/1/461807/100/0/threaded

Copyright 2024, cxsecurity.com

 

Back to Top