Summary
The host is installed with VMWare product(s) that are vulnerable to local privilege escalation vulnerability.
Impact
Successful exploitation could result in arbitrary code execution on linux based host system by an unprivileged user and can also crash the application.
Local access is required in order to execute the set-uid vmware-authd and Also, vix.inGuest.enable configuration must be set.
Impact Level : System
Solution
Upgrade VMware Product(s) to below version,
VMware Player 1.0.7 build 91707 or 2.0.4 build 93057 or later www.vmware.com/download/player/
VMware Server 1.0.6 build 91891 or later
www.vmware.com/download/server/
VMware Workstation 5.5.7 build 91707 or 6.0.4 build 93057 or later www.vmware.com/download/ws/
Insight
Issue is due to local exploitation of an untrusted library path in vmware-authd.
VMware VIX API (Application Program Interface) fails to adequately bounds check user supplied input before copying it to insufficient size buffer.
Affected
VMware Player 1.x - before 1.0.7 build 91707 on Linux VMware Player 2.x - before 2.0.4 build 93057 on Linux VMware Server 1.x - before 1.0.6 build 91891 on Linux VMware Workstation 5.x - before 5.5.7 build 91707 on Linux VMware Workstation 6.x - before 6.0.4 build 93057 on Linux
References
Severity
Classification
-
CVE CVE-2008-0967, CVE-2008-2100 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities