[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] VMSA-2011-0006 VMware vmrun utility local privilege escalation



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2011-0006
Synopsis:          VMware vmrun utility local privilege escalation
Issue date:        2011-03-29
Updated on:        2011-03-29 (initial release of advisory)
CVE numbers:       CVE-2011-1126
- ------------------------------------------------------------------------

1. Summary

   The VMware vmrun utility is susceptible to a local privilege
   escalation in non-standard configurations.

2. Relevant releases

   VMware VIX API for Linux 1.10.2 and earlier

   VMware Workstation 7.1.3 on Linux and earlier
   VMware Workstation 6.5.5 on Linux and earlier

3. Problem Description

 a. VMware Linux based vmrun utility local privilege escalation

    VMware vmrun is a utility that is used to perform various tasks on
    virtual machines. The vmrun utility runs on any platform with VIX
    libraries installed. It is installed in VMware Workstation by
    default.

    In non-standard filesystem configurations, an attacker with the
    ability to place files into a predefined library path, could take
    execution control of vmrun.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2011-1126 to this issue.

    VMware would like to thank Tim Brown for reporting this issue to
    us.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    VIX API        any       Windows  not affected
    VIX API        1.x       Linux    patch pending

    Workstation    7.x       Windows  not affected
    Workstation    7.x       Linux    7.1.4 build 385536 or later
    Workstation    6.5.x     Windows  not affected
    Workstation    6.5.x     Linux    updated version of vmrun *

    Player         any       any      not affected

    AMS            any       any      not affected

    Fusion         any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            any       ESX      not affected

   * Refer to VMware Knowledge Base article 1035509 for the updated
     version of vmrun for Workstation 6.5.x.


4. Solution

   Please review the patch/release notes for your product and version
   and verify the checksum of your downloaded file.

   Workstation 7.1.4
   -----------------
   For Linux
   http://www.vmware.com/downloads/download.do?downloadGroup=WKST-714-LX
   Release notes:
   https://www.vmware.com/support/ws71/doc/releasenotes_ws714.html

   Workstation for Linux 32-bit with VMware Tools
   md5sum: 5f5f25b1cfd8990e46db07788fe0adab
   sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9

   Workstation for Linux 32-bit without VMware Tools
   md5sum: 918e8f61eab4bec4c6ca03f72bdd8fb9
   sha1sum: 955b3a08375bb1fa39cb9c1c4142f13de604acf6

   Workstation for Linux 64-bit with VMware Tools
   md5sum: 68b424f836f63c12b071a791f80b1593
   sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6

   Workstation for Linux 64-bit without VMware Tools
   md5sum: f91a8c1ae911356b8eebf767db1a5873
   sha1sum: 58973839c0ff6f56a9d2371a1ca1b5189b3f7bc5

   Workstation 6.5.x - VMware Knowledge Base article 1035509
   ---------------------------------------------------------
   http://kb.vmware.com/kb/1035509


5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1126

- ------------------------------------------------------------------------
6. Change log

2011-03-29  VMSA-2011-0006
Initial security advisory in conjunction with the release of VMware
Workstation 7.1.4 and KB article 1035509.

- -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNksRODEcm8Vbi9kMRAtcEAJ9HwI7cOmOLu0gbLfZ2IKqtCrTVlACgwsLY
TYvZtXAefoZLhjRff7F/rmQ=
=lE0t
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/