lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 29 Mar 2011 22:49:28 -0700
From: VMware Security Team <security@...are.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: VMSA-2011-0006 VMware vmrun utility local
	privilege escalation

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2011-0006
Synopsis:          VMware vmrun utility local privilege escalation
Issue date:        2011-03-29
Updated on:        2011-03-29 (initial release of advisory)
CVE numbers:       CVE-2011-1126
- ------------------------------------------------------------------------

1. Summary

   The VMware vmrun utility is susceptible to a local privilege
   escalation in non-standard configurations.

2. Relevant releases

   VMware VIX API for Linux 1.10.2 and earlier

   VMware Workstation 7.1.3 on Linux and earlier
   VMware Workstation 6.5.5 on Linux and earlier

3. Problem Description

 a. VMware Linux based vmrun utility local privilege escalation

    VMware vmrun is a utility that is used to perform various tasks on
    virtual machines. The vmrun utility runs on any platform with VIX
    libraries installed. It is installed in VMware Workstation by
    default.

    In non-standard filesystem configurations, an attacker with the
    ability to place files into a predefined library path, could take
    execution control of vmrun.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2011-1126 to this issue.

    VMware would like to thank Tim Brown for reporting this issue to
    us.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    VIX API        any       Windows  not affected
    VIX API        1.x       Linux    patch pending

    Workstation    7.x       Windows  not affected
    Workstation    7.x       Linux    7.1.4 build 385536 or later
    Workstation    6.5.x     Windows  not affected
    Workstation    6.5.x     Linux    updated version of vmrun *

    Player         any       any      not affected

    AMS            any       any      not affected

    Fusion         any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            any       ESX      not affected

   * Refer to VMware Knowledge Base article 1035509 for the updated
     version of vmrun for Workstation 6.5.x.


4. Solution

   Please review the patch/release notes for your product and version
   and verify the checksum of your downloaded file.

   Workstation 7.1.4
   -----------------
   For Linux
   http://www.vmware.com/downloads/download.do?downloadGroup=WKST-714-LX
   Release notes:
   https://www.vmware.com/support/ws71/doc/releasenotes_ws714.html

   Workstation for Linux 32-bit with VMware Tools
   md5sum: 5f5f25b1cfd8990e46db07788fe0adab
   sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9

   Workstation for Linux 32-bit without VMware Tools
   md5sum: 918e8f61eab4bec4c6ca03f72bdd8fb9
   sha1sum: 955b3a08375bb1fa39cb9c1c4142f13de604acf6

   Workstation for Linux 64-bit with VMware Tools
   md5sum: 68b424f836f63c12b071a791f80b1593
   sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6

   Workstation for Linux 64-bit without VMware Tools
   md5sum: f91a8c1ae911356b8eebf767db1a5873
   sha1sum: 58973839c0ff6f56a9d2371a1ca1b5189b3f7bc5

   Workstation 6.5.x - VMware Knowledge Base article 1035509
   ---------------------------------------------------------
   http://kb.vmware.com/kb/1035509


5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1126

- ------------------------------------------------------------------------
6. Change log

2011-03-29  VMSA-2011-0006
Initial security advisory in conjunction with the release of VMware
Workstation 7.1.4 and KB article 1035509.

- -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNksRODEcm8Vbi9kMRAtcEAJ9HwI7cOmOLu0gbLfZ2IKqtCrTVlACgwsLY
TYvZtXAefoZLhjRff7F/rmQ=
=lE0t
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ