[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] VMSA-2011-0006 VMware vmrun utility local privilege escalation
- To: full-disclosure@xxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] VMSA-2011-0006 VMware vmrun utility local privilege escalation
- From: VMware Security Team <security@xxxxxxxxxx>
- Date: Tue, 29 Mar 2011 22:49:28 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2011-0006
Synopsis: VMware vmrun utility local privilege escalation
Issue date: 2011-03-29
Updated on: 2011-03-29 (initial release of advisory)
CVE numbers: CVE-2011-1126
- ------------------------------------------------------------------------
1. Summary
The VMware vmrun utility is susceptible to a local privilege
escalation in non-standard configurations.
2. Relevant releases
VMware VIX API for Linux 1.10.2 and earlier
VMware Workstation 7.1.3 on Linux and earlier
VMware Workstation 6.5.5 on Linux and earlier
3. Problem Description
a. VMware Linux based vmrun utility local privilege escalation
VMware vmrun is a utility that is used to perform various tasks on
virtual machines. The vmrun utility runs on any platform with VIX
libraries installed. It is installed in VMware Workstation by
default.
In non-standard filesystem configurations, an attacker with the
ability to place files into a predefined library path, could take
execution control of vmrun.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2011-1126 to this issue.
VMware would like to thank Tim Brown for reporting this issue to
us.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
VIX API any Windows not affected
VIX API 1.x Linux patch pending
Workstation 7.x Windows not affected
Workstation 7.x Linux 7.1.4 build 385536 or later
Workstation 6.5.x Windows not affected
Workstation 6.5.x Linux updated version of vmrun *
Player any any not affected
AMS any any not affected
Fusion any any not affected
ESXi any ESXi not affected
ESX any ESX not affected
* Refer to VMware Knowledge Base article 1035509 for the updated
version of vmrun for Workstation 6.5.x.
4. Solution
Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.
Workstation 7.1.4
-----------------
For Linux
http://www.vmware.com/downloads/download.do?downloadGroup=WKST-714-LX
Release notes:
https://www.vmware.com/support/ws71/doc/releasenotes_ws714.html
Workstation for Linux 32-bit with VMware Tools
md5sum: 5f5f25b1cfd8990e46db07788fe0adab
sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9
Workstation for Linux 32-bit without VMware Tools
md5sum: 918e8f61eab4bec4c6ca03f72bdd8fb9
sha1sum: 955b3a08375bb1fa39cb9c1c4142f13de604acf6
Workstation for Linux 64-bit with VMware Tools
md5sum: 68b424f836f63c12b071a791f80b1593
sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6
Workstation for Linux 64-bit without VMware Tools
md5sum: f91a8c1ae911356b8eebf767db1a5873
sha1sum: 58973839c0ff6f56a9d2371a1ca1b5189b3f7bc5
Workstation 6.5.x - VMware Knowledge Base article 1035509
---------------------------------------------------------
http://kb.vmware.com/kb/1035509
5. References
CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1126
- ------------------------------------------------------------------------
6. Change log
2011-03-29 VMSA-2011-0006
Initial security advisory in conjunction with the release of VMware
Workstation 7.1.4 and KB article 1035509.
- -----------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2011 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8
wj8DBQFNksRODEcm8Vbi9kMRAtcEAJ9HwI7cOmOLu0gbLfZ2IKqtCrTVlACgwsLY
TYvZtXAefoZLhjRff7F/rmQ=
=lE0t
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/