what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2013-0013

VMware Security Advisory 2013-0013
Posted Nov 14, 2013
Authored by VMware | Site vmware.com

VMware Security Advisory 2013-0013 - VMware has updated VMware Workstation and VMware Player to address a vulnerability that could result in an escalation of privilege on Linux-based host machines.

tags | advisory
systems | linux
advisories | CVE-2013-5972
SHA-256 | 3bc47daa98136732b874042b14387b0cf0891a83da155e6373c023b5444f3117

VMware Security Advisory 2013-0013

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2013-0013
Synopsis: VMware Workstation host privilege escalation vulnerability
Issue date: 2013-11-14
Updated on: 2013-11-14 (initial advisory)
CVE numbers: CVE-2013-5972

- ------------------------------------------------------------------------

1. Summary

VMware has updated VMware Workstation and VMware Player to address a
vulnerability that could result in an escalation of privilege on
Linux-based host machines.

2. Relevant releases

VMware Workstation for Linux 9.x prior to version 9.0.3

VMware Player for Linux 5.x prior to version 5.0.3

3. Problem Description

a. VMware shared library privilege escalation

VMware Workstation and VMware Player contain a vulnerability in
the handling of shared libraries. This issue may allow a local
malicious user to escalate their privileges to root on the host OS.

The vulnerability does not allow for privilege escalation from the
Guest Operating System to the host or vice-versa.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2013-5972 to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/
Product Version on Apply Patch*
============= ======= ======= =================
Workstation 10.x Linux not affected
Workstation 9.x Linux 9.0.3

Player 6.x Linux not affected
Player 5.x Linux 5.0.3

Fusion any Mac/OS Not affected

ESXi any ESXi Not affected

ESX any ESX Not affected

4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

VMware Workstation 9.x
----------------------
https://www.vmware.com/go/downloadworkstation

VMware Player 5.x
----------------------
https://www.vmware.com/go/downloadplayer

5. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5972

-----------------------------------------------------------------------

6. Change log

2013-11-14 VMSA-2013-0013
Initial security advisory in conjunction with the release of
an updated version of VMware Workstation 9 and VMware Player 5.

-----------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2013 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFShPyzDEcm8Vbi9kMRAjDrAKDjfSvmniJFEboWuBUPUTCaKuvmTQCgv0u3
kZiMDISGo+hoN8jT9ad2ZTE=
=hYQy
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close