lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4CF8957B.6000301@vmware.com>
Date: Thu, 02 Dec 2010 23:00:11 -0800
From: VMware Security team <security@...are.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: VMSA-2010-0018 VMware hosted products and ESX
 patches resolve multiple security issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2010-0018
Synopsis:          VMware hosted products and ESX patches resolve
                   multiple security issues
Issue date:        2010-12-02
Updated on:        2010-12-02 (initial release of advisory)
CVE numbers:       CVE-2010-4295 CVE-2010-4296 CVE-2010-4297
                   CVE-2010-4294
- ------------------------------------------------------------------------

1. Summary

   VMware hosted products and ESX patches resolve multiple security
   issues.

2. Relevant releases

   VMware Workstation 7.1.1 and earlier,
   VMware Workstation 6.5.4 and earlier,
   VMware Player 3.1.1 and earlier,
   VMware Player 2.5.4 and earlier,

   VMware Fusion 3.1.1 and earlier,

   ESXi 4.1 without patch ESXi410-201010402-BG or later
   ESXi 4.0 without patch ESXi400-201009402-BG or later
   ESXi 3.5 without patch ESXe350-201008402-T-BG or later

   ESX 4.1 without patch ESX410-201010405-BG
   ESX 4.0 without patch ESX400-201009401-SG
   ESX 3.5 without patch ESX350-201008409-BG

   Note: VMware Server was declared End Of Availability on January 2010,
         support will be limited to Technical Guidance for the duration
         of the support term.

3. Problem Description

 a. VMware Workstation, Player and Fusion vmware-mount race condition

    The way temporary files are handled by the mounting process could
    result in a race condition. This issue could allow a local user on
    the host to elevate their privileges.

    VMware Workstation and Player running on Microsoft Windows are not
    affected.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2010-4295 to this issue.

    VMware would like to thank Dan Rosenberg for reporting this issue.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    Workstation    7.x       Linux    7.1.2 Build 301548 or later
    Workstation    7.x       Windows  not affected
    Workstation    6.5.x     any      not affected

    Player         3.1.x     Linux    3.1.2 Build 301548 or later
    Player         3.1.x     Windows  not affected
    Player         2.5.x     any      not affected

    AMS            any       any      not affected

    Server         2.0.2     Linux    affected, no patch planned
    Server         2.0.2     Windows  not affected

    Fusion         3.1.x     Mac OS/X 3.1.2 Build 332101 or later
    Fusion         2.x       Mac OS/X not affected

    ESXi           any       ESXi     not affected

    ESX            any       ESX      not affected


 b. VMware Workstation, Player and Fusion vmware-mount privilege
    escalation

    vmware-mount which is a suid binary has a flaw in the way libraries
    are loaded.  This issue could allow local users on the host to
    execute arbitrary shared object files with root privileges.

    VMware Workstation and Player running on Microsoft Windows are not
    affected.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2010-4296 to this issue.

    VMware would like to thank Martin Carpenter for reporting this
    issue.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    Workstation    7.x       Linux    7.1.2 Build 301548 or later
    Workstation    7.x       Windows  not affected
    Workstation    6.5.x     any      not affected

    Player         3.1.x     Linux    3.1.2 Build 301548 or later
    Player         3.1.x     Windows  not affected
    Player         2.5.x     any      not affected

    AMS            any       any      not affected

    Server         2.0.2     Linux    affected, no patch planned
    Server         2.0.2     Windows  not affected

    Fusion         3.1.x     Mac OS/X 3.1.2 Build 332101
    Fusion         2.x       Mac OS/X not affected

    ESXi           any       ESXi     not affected

    ESX            any       ESX      not affected


 c. OS Command Injection in VMware Tools update

    A vulnerability in the input validation of VMware Tools update
    allows for injection of commands. The issue could allow a  user
    on the host to execute commands on the guest operating system
    with root privileges.

    The issue can only be exploited if VMware Tools is not fully
    up-to-date.  Windows-based virtual machines are not affected.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2010-4297 to this issue.

    VMware would like to thank Nahuel Grisolia of Bonsai Information
    Security, http://www.bonsai-sec.com, for reporting this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    Workstation    7.x       any      7.1.2 Build 301548 or later
    Workstation    6.5.x     any      6.5.5 Build 328052 or later

    Player         3.1.x     any      3.1.2 Build 301548 or later
    Player         2.5.x     any      2.5.5 Build 328052 or later

    AMS            any       any      not affected

    Server         2.0.2     any      affected, no patch planned

    Fusion         3.1.x     Mac OS/X 3.1.2 Build 332101
    Fusion         2.x       Mac OS/X 2.0.8 Build 328035

    ESXi           4.1       ESXi     ESXi410-201010402-BG
    ESXi           4.0       ESXi     ESXi400-201009402-BG
    ESXi           3.5       ESXi     ESXe350-201008402-T-BG **

    ESX            4.1       ESX      ESX410-201010405-BG
    ESX            4.0       ESX      ESX400-201009401-SG
    ESX            3.5       ESX      ESX350-201008409-BG **
    ESX            3.0.3     ESX      not affected

  * hosted products are VMware Workstation, Player, ACE, Fusion.
  ** Non Windows-based guest systems on ESXi 3.5 and ESX 3.5 only:
     - Install the relevant ESX patch.
     - Manually upgrade tools in the virtual machine (virtual machine
       users will not be prompted to upgrade tools).  Note the VI
       Client may not show that the VMware tools is out of date in the
       summary tab.

 d. VMware VMnc Codec frame decompression remote code execution

    The VMware movie decoder contains the VMnc media codec that is
    required to play back movies recorded with VMware Workstation,
    VMware Player and VMware ACE, in any compatible media player. The
    movie decoder is installed as part of VMware Workstation, VMware
    Player and VMware ACE, or can be downloaded as a stand alone
    package.

    A function in the decoder frame decompression routine implicitly
    trusts a size value.  An attacker can utilize this to miscalculate
    a destination pointer, leading to the corruption of a heap buffer,
    and could allow for execution of arbitrary code with the privileges
    of the user running an application utilizing the vulnerable codec.

    For an attack to be successful the user must be tricked into
    visiting a malicious web page or opening a malicious video file on
    a system that has the vulnerable version of the VMnc codec installed.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2010-4294 to this issue.

    VMware would like to thank Aaron Portnoy and Logan Brown of
    TippingPoint DVLabs for reporting this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    Movie Decoder  any       Windows  7.1.2 Build 301548 or later
    Movie Decoder  any       Windows  6.5.5 Build 328052 or later

    Workstation    7.x       Windows  7.1.2 Build 301548 or later
    Workstation    7.x       Linux    not affected
    Workstation    6.5.x     Windows  6.5.5 build 328052 or later
    Workstation    6.5.x     Linux    not affected

    Player         3.x       Windows  3.1.2 Build 301548 or later
    Player         3.x       Linux    not affected
    Player         2.5.x     Windows  2.5.5 build 246459 or later
    Player         2.5.x     Linux    not affected

    AMS            any       any      not affected

    Server         2.x       Window   affected, no patch planned
    Server         2.x       Linux    not affected

    Fusion         any       Mac OS/X not affected

    ESXi           any       ESXi     not affected

    ESX            any       ESX      not affected

4. Solution
   Please review the patch/release notes for your product and version
   and verify the md5sum and/or the sha1sum of your downloaded file.

   VMware Workstation Movie Decoder
   --------------------------------
   Workstation 7.1.2 Movie Decoder
   md5sum: a4d761a21670c735d04abb89e674656e
   sha1sum: b66673c30f3b8b8fb18035d08a6255f478be875d

   Workstation 6.5.5 Movie Decoder build 328052
   md5sum: 1223bb57d97df39259be2c6c90a65ba6
   sha1sum: 3ae7cdeeeebf6a716ec73f934077545945474ff6


   VMware Workstation 7.1.3
   ------------------------
   http://www.vmware.com/download/ws/
   Release notes:
   http://downloads.vmware.com/support/ws71/doc/releasenotes_ws713.html

   Workstation for Windows 32-bit and 64-bit with VMware Tools
   md5sum: 7b9dc01bf733047a00711f5800df6107
   sha1sum: 5f36117c64455f3dff3b7410a0bfc72e41905181

   Workstation for Windows 32-bit and 64-bit without VMware Tools
   md5sum: d102006f7a3951dd58325f5b4e151abe
   sha1sum: ccfd70278d3c89b38776d656fa797ca8e9b28d55

   Workstation 6.5.5
   -----------------
   http://www.vmware.com/download/ws/
   Release notes:
   http://downloads.vmware.com/support/ws65/doc/releasenotes_ws655.html

   Workstation for Windows 32-bit and 64-bit
   md5sum: 7bff9b621529efb0de808a45e7821274
   sha1sum: 41af7a9a78717cb85dd30b4d830e99fd5de49cc1

   Workstation for Linux 32-bit	(rpm)
   md5sum: 17c3f1a0e6ccf2b1e224a5d75c845a47
   sha1sum: 3027b4e2215fae84fa9311f8cd762fee17e89df0

   Workstation for Linux 32-bit	(bundle)
   md5sum: 7c24811fb999204f144d8b9f50e9fcae
   sha1sum: 18a05e6f4f772b7f0563dbd17596b66d1db8e9fa

   Workstation for Linux 64-bit	(rpm)
   md5sum: c25c2535d8091c4d46701ed081347901
   sha1sum: f4356bc224ea9805dac2d4b677f88a2f4220353e

   Workstation for Linux 64-bit	(bundle)
   md5sum: 7012bdaf182d256672ff2eb24b00a40f
   sha1sum: 58ecb2a494d4c7cc663e2028cf76c13d458fecac

   VMware Player 3.1.3
   -------------------
   http://www.vmware.com/download/player/
   Release notes:

http://downloads.vmware.com/support/player31/doc/releasenotes_player313.html

   VMware Player for Windows 32-bit and 64-bit	
   md5sum: bd66a0ab8ae87d5cfa32b8ff44f99d1f
   sha1sum: 8ab358efc97a64639cce83766c35d43b0d662132

   VMware Player for Linux 32-bit (bundle)
   md5sum: e5d0bf19a1908262f63a8f88df77f73e
   sha1sum: 4abb87d37706c47a86337ada1d23d390455e4931

   VMware Player for Linux 64-bit (bundle)
   md5sum: 18e6aae025ee2ef9f10ce6d9271ce472
   sha1sum: 6608bce64811be4480e667726aefefdc2b71e4e3

   VMware Player 2.5.5
   -------------------
   VMware Player 2.5.5 for Windows 32-bit and 64-bit
   md5sum: 780b2c4e2b1610dea3090b1cd81d5ad7
   sha1sum: f6c451a11a4fe66e5a465de960de1358e83b8314

   VMware Player 2.5.5 for Linux 32-bit (rpm)
   md5sum: 9e13ee3904bd2377ffb8cfa66460fe92
   sha1sum: 2482acad19f6b23cf0c236d1ce87d4805b7b0e6c 	

   VMware Player 2.5.5 for Linux 32-bit (bundle)
   MD5SUM: 46dcfe9343f688d60e249d9e9c3853a4
   SHA1SUM: abfdeaf2cac83c630662607e7b95439367376abf 	

   VMware Player 2.5.5 for Linux 64-bit (rpm)
   MD5SUM: 52d6dcdeed9e564c8cfe8c35cec885f0
   SHA1SUM: dbaa6dac55f592b9c6b16d7505796a2580836f4b 	

   VMware Player 2.5.5 for Linux 64-bit (bundle)
   md5sum: 6c9a677820010ccd20f829cb5d2c057b
   sha1sum: ff6eccba3125229e8adbc1cb96764c2f116d89c5 	

   VMware Fusion
   -------------

   VMware Fusion 3.1.2 build 332101
   md5sum: a809170c9bd55a102c007c20269c4729
   sha1sum: bf56e0f873d8e0d67fd73fba5e597e0931083e03 	

   VMware Fusion Lite 3.1.2 build 332101
   md5sum: d7db517cb25320152723f8535c90dd16
   sha1sum: 555d9bd03327731270acfc851ba15b28ef3f6720

   VMware Fusion 2.0.8 (for Intel-based Macs)
   md5sum: 9951d3b7985c39c685d59eaa73fe267c
   sha1sum: 11463924b5a7f82161090416905774da45e1cd3e 	

   VMware Fusion Lite 2.0.8 (for Intel-based Macs)
   md5sum: 0bee2ef0d0e9e543b2468ed9618e32c8
   sha1sum: fa56bb7ea3493d07610051f92b9941305a436a2f

   ESXi 4.1
   --------
   ESXi410-201010001
   Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-251-20101108-239087/ESXi410-201010001.zip
   md5sum: 05f1049c7a595481cd682e92fe8d3285
   sha1sum: f6993c185f7d1cb971a4ae6e017e0246b8c25a76
   http://kb.vmware.com/kb/1027753

   Note ESXi410-201010001 contains the following security fix:
ESXi410-201010402-BG

   ESXi 4.0
   --------
   ESXi400-201009001
   Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-241-20100919-436526/ESXi400-201009001.zip
   md5sum: bfc1b78f14d970c556b828492f5920e1
   sha1sum:  a311a4af41aa1202bb6b156694bbc045c67df91a
   http://kb.vmware.com/kb/1025322

   Note ESXi400-201009001 contains the following security fix:
ESXi400-201009402-BG

   ESXi 3.5
   --------
   ESXe350-201008401-O-SG
   http://download3.vmware.com/software/vi/ESXe350-201008401-O-SG.zip
   md5sum:a2bb0afbc677ba847bedecb44dbdd4b3
   http://kb.vmware.com/kb/1026139

   Note ESXe350-201008401-O-SG contains the following security fix:
ESXe350-201008402-T-BG

   ESX 4.1
   -------
   ESX410-201010001

https://hostupdate.vmware.com/software/VUM/OFFLINE/release-252-20101109-182791/ESX410-201010001.zip
   md5sum: ff4435fd3c74764f064e047c6e5e7809
   sha1sum:322981f4dbb9e5913c8f38684369444ff7e265b3
   http://kb.vmware.com/kb/1027027

   ESX410-201010001 contains the following security fix: ESX410-201010405-BG

   ESX 4.0
   -------
   ESX400-201009001

https://hostupdate.vmware.com/software/VUM/OFFLINE/release-240-20100919-359479/ESX400-201009001.zip
   md5sum: 988c593b7a7abf0be5b72970ac64a369
   sha1sum: 26d875955b01c19f4e56703216e135257c08836f
   http://kb.vmware.com/kb/1025321

   ESX400-201009001 contains the following security fix: ESX400-201009401-SG

   ESX 3.5
   -------
   ESX350-201008409-BG
   http://download3.vmware.com/software/vi/ESX350-201008409-BG.zip
   md5sum: f2c4a4a53695057de25f095029d713fb
   http://kb.vmware.com/kb/1026133

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4295
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4296
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4297
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4294

- ------------------------------------------------------------------------

6. Change log

2010-12-02  VMSA-2010-0018
Initial security advisory after release of Workstation 6.5.5,
Player 2.5.5, Fusion 2.0.8 and Fusion 3.1.2 on 2010-12-02, ESX patches
and Workstation 7.1.2 and 7.1.3 were released previously.

- -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2010 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)

iEYEARECAAYFAkz4lXgACgkQS2KysvBH1xn0qgCeO9eTk2xMbdx3Ssr24lCYzlUC
jXoAnjxrD5t4JyuWQftQ9ciZSDpIeZzg
=TEE9
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ