[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

VMSA-2011-0006 VMware vmrun utility local privilege escalation



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                  VMware Security Advisory

Advisory ID:       VMSA-2011-0006
Synopsis:          VMware vmrun utility local privilege escalation
Issue date:        2011-03-29
Updated on:        2011-03-29 (initial release of advisory)
CVE numbers:       CVE-2011-1126
- ------------------------------------------------------------------------

1. Summary

  The VMware vmrun utility is susceptible to a local privilege
  escalation in non-standard configurations.

2. Relevant releases

  VMware VIX API for Linux 1.10.2 and earlier

  VMware Workstation 7.1.3 on Linux and earlier
  VMware Workstation 6.5.5 on Linux and earlier

3. Problem Description

a. VMware Linux based vmrun utility local privilege escalation

   VMware vmrun is a utility that is used to perform various tasks on
   virtual machines. The vmrun utility runs on any platform with VIX
   libraries installed. It is installed in VMware Workstation by
   default.

   In non-standard filesystem configurations, an attacker with the
   ability to place files into a predefined library path, could take
   execution control of vmrun.

   The Common Vulnerabilities and Exposures project (cve.mitre.org)
   has assigned the name CVE-2011-1126 to this issue.

   VMware would like to thank Tim Brown for reporting this issue to
   us.

   Column 4 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware         Product   Running  Replace with/
   Product        Version   on       Apply Patch
   =============  ========  =======  =================
   vCenter        any       Windows  not affected

   VIX API        any       Windows  not affected
   VIX API        1.x       Linux    patch pending

   Workstation    7.x       Windows  not affected
   Workstation    7.x       Linux    7.1.4 build 385536 or later
   Workstation    6.5.x     Windows  not affected
   Workstation    6.5.x     Linux    updated version of vmrun *

   Player         any       any      not affected

   AMS            any       any      not affected

   Fusion         any       any      not affected

   ESXi           any       ESXi     not affected

   ESX            any       ESX      not affected

  * Refer to VMware Knowledge Base article 1035509 for the updated
    version of vmrun for Workstation 6.5.x.


4. Solution

  Please review the patch/release notes for your product and version
  and verify the checksum of your downloaded file.

  Workstation 7.1.4
  -----------------
  For Linux
  http://www.vmware.com/downloads/download.do?downloadGroup=WKST-714-LX
  Release notes:
  https://www.vmware.com/support/ws71/doc/releasenotes_ws714.html

  Workstation for Linux 32-bit with VMware Tools
  md5sum: 5f5f25b1cfd8990e46db07788fe0adab
  sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9

  Workstation for Linux 32-bit without VMware Tools
  md5sum: 918e8f61eab4bec4c6ca03f72bdd8fb9
  sha1sum: 955b3a08375bb1fa39cb9c1c4142f13de604acf6

  Workstation for Linux 64-bit with VMware Tools
  md5sum: 68b424f836f63c12b071a791f80b1593
  sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6

  Workstation for Linux 64-bit without VMware Tools
  md5sum: f91a8c1ae911356b8eebf767db1a5873
  sha1sum: 58973839c0ff6f56a9d2371a1ca1b5189b3f7bc5

  Workstation 6.5.x - VMware Knowledge Base article 1035509
  ---------------------------------------------------------
  http://kb.vmware.com/kb/1035509


5. References

  CVE numbers
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1126

- ------------------------------------------------------------------------
6. Change log

2011-03-29  VMSA-2011-0006
Initial security advisory in conjunction with the release of VMware
Workstation 7.1.4 and KB article 1035509.

- -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

 * security-announce at lists.vmware.com
 * bugtraq at securityfocus.com
 * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNksRODEcm8Vbi9kMRAtcEAJ9HwI7cOmOLu0gbLfZ2IKqtCrTVlACgwsLY
TYvZtXAefoZLhjRff7F/rmQ=
=lE0t
-----END PGP SIGNATURE-----