VMware vmrun utility local privilege escalation

2011-04-04 / 2011-04-05
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-264


CVSS Base Score: 6.9/10
Impact Subscore: 10/10
Exploitability Subscore: 3.4/10
Exploit range: Local
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2011-0006 Synopsis: VMware vmrun utility local privilege escalation Issue date: 2011-03-29 Updated on: 2011-03-29 (initial release of advisory) CVE numbers: CVE-2011-1126 - ------------------------------------------------------------------------ 1. Summary The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. 2. Relevant releases VMware VIX API for Linux 1.10.2 and earlier VMware Workstation 7.1.3 on Linux and earlier VMware Workstation 6.5.5 on Linux and earlier 3. Problem Description a. VMware Linux based vmrun utility local privilege escalation VMware vmrun is a utility that is used to perform various tasks on virtual machines. The vmrun utility runs on any platform with VIX libraries installed. It is installed in VMware Workstation by default. In non-standard filesystem configurations, an attacker with the ability to place files into a predefined library path, could take execution control of vmrun. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-1126 to this issue. VMware would like to thank Tim Brown for reporting this issue to us. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not affected VIX API any Windows not affected VIX API 1.x Linux patch pending Workstation 7.x Windows not affected Workstation 7.x Linux 7.1.4 build 385536 or later Workstation 6.5.x Windows not affected Workstation 6.5.x Linux updated version of vmrun * Player any any not affected AMS any any not affected Fusion any any not affected ESXi any ESXi not affected ESX any ESX not affected * Refer to VMware Knowledge Base article 1035509 for the updated version of vmrun for Workstation 6.5.x. 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. Workstation 7.1.4 ----------------- For Linux http://www.vmware.com/downloads/download.do?downloadGroup=WKST-714-LX Release notes: https://www.vmware.com/support/ws71/doc/releasenotes_ws714.html Workstation for Linux 32-bit with VMware Tools md5sum: 5f5f25b1cfd8990e46db07788fe0adab sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9 Workstation for Linux 32-bit without VMware Tools md5sum: 918e8f61eab4bec4c6ca03f72bdd8fb9 sha1sum: 955b3a08375bb1fa39cb9c1c4142f13de604acf6 Workstation for Linux 64-bit with VMware Tools md5sum: 68b424f836f63c12b071a791f80b1593 sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6 Workstation for Linux 64-bit without VMware Tools md5sum: f91a8c1ae911356b8eebf767db1a5873 sha1sum: 58973839c0ff6f56a9d2371a1ca1b5189b3f7bc5 Workstation 6.5.x - VMware Knowledge Base article 1035509 --------------------------------------------------------- http://kb.vmware.com/kb/1035509 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1126 - ------------------------------------------------------------------------ 6. Change log 2011-03-29 VMSA-2011-0006 Initial security advisory in conjunction with the release of VMware Workstation 7.1.4 and KB article 1035509. - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2011 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8 wj8DBQFNksRODEcm8Vbi9kMRAtcEAJ9HwI7cOmOLu0gbLfZ2IKqtCrTVlACgwsLY TYvZtXAefoZLhjRff7F/rmQ= =lE0t -----END PGP SIGNATURE-----

References:

http://xforce.iss.net/xforce/xfdb/66472
http://www.vupen.com/english/advisories/2011/0816
http://www.vmware.com/security/advisories/VMSA-2011-0006.html
http://www.securityfocus.com/bid/47094
http://www.securityfocus.com/archive/1/archive/1/517240/100/0/threaded
http://securitytracker.com/id?1025270
http://secunia.com/advisories/43943
http://secunia.com/advisories/43885
http://lists.vmware.com/pipermail/security-announce/2011/000131.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top