Summary
The host is installed with VMWare product(s) that are vulnerable to arbitrary code execution vulnerability.
Impact
Successful exploitation allow attackers to execute arbitrary code on the affected system and local users could bypass certain security restrictions or can gain escalated privileges.
Impact Level: System
Solution
Upgrade VMware to,
VMware Workstation 6.0.4 or later
www.vmware.com/download/ws/
VMware Player 2.0.4 or later
www.vmware.com/download/player/
Insight
VMware Host Guest File System (HGFS) shared folders feature allows users to transfer data between a guest operating system and the host operating system.
A heap buffer overflow exists in VMware HGFS which allows guest system to execute code in the context of vmx process on the host.
The issue exists only when VMWare system has shared folder enabled.
Successful exploitation requires that the vix.inGuest.enable configuration value is enabled
Affected
VMware Player 2.0.x - 2.0.3 on Linux
VMware Workstation 6.0.x - 6.0.3 on Linux
References
Severity
Classification
-
CVE CVE-2008-2098 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- ScriptFTP 'GETLIST' or 'GETFILE' Commands Remote Buffer Overflow Vulnerability
- IpTools Tiny TCP/IP Servers Remote Buffer Overflow Vulnerability
- IrfanView JPEG-2000 Plugin Remote Stack Based Buffer Overflow Vulnerability
- Monkey HTTPD Host Header Buffer Overflow Vulnerability
- VMCI/HGFS VmWare Code Execution Vulnerability (Linux)