Secunia Security Advisory - Multiple vulnerabilities have been reported in various VMware products, which can be exploited by malicious, local users to gain escalated privileges or cause a DoS (Denial of Service) or by malicious people to compromise a vulnerable system.
08f09e82199488119ccb28852685050d7fedc7bb928e4f58a42631edb144d384
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
VMWare Products Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26890
VERIFY ADVISORY:
http://secunia.com/advisories/26890/
CRITICAL:
Moderately critical
IMPACT:
Privilege escalation, DoS, System access
WHERE:
>From local network
REVISION:
1.1 originally posted 2007-09-20
OPERATING SYSTEM:
VMware ESX Server 3.x
http://secunia.com/product/10757/
VMware ESX Server 2.x
http://secunia.com/product/2125/
SOFTWARE:
VMware Workstation 5.x
http://secunia.com/product/5080/
VMware Workstation 6.x
http://secunia.com/product/14321/
VMware Player 1.x
http://secunia.com/product/6594/
VMWare Player 2.x
http://secunia.com/product/15771/
VMware Server 1.x
http://secunia.com/product/10733/
VMware ACE 1.x
http://secunia.com/product/6593/
VMWare ACE 2.x
http://secunia.com/product/15772/
DESCRIPTION:
Multiple vulnerabilities have been reported in various VMware
products, which can be exploited by malicious, local users to gain
escalated privileges or cause a DoS (Denial of Service) or by
malicious people to compromise a vulnerable system.
1) An unspecified error can be exploited by a user with
administrative privileges in the guest system to cause a memory
corruption on a certain host process.
Successful exploitation may allow execution of arbitrary code on the
host system.
2) An unspecified error can be exploited within the guest system to
cause a host process to crash.
The vulnerabilities affect VMWare ESX 3.0.1, 3.0.0, 2.5.4, 2.5.3,
2.1.3, and 2.0.2, VMWare Workstation 6.0.0 and 5.5.4, VMWare Player
2.0.0 and 1.0.4, VMWare Server 1.0.3, and VMWare ACE 2.0.0 and
1.0.3.
3) An integer underflow error in the DHCP server can be exploited to
cause a stack-based buffer overflow via a specially crafted DHCP
packet.
4) An integer overflow error in the DHCP server can be exploited to
cause a stack-based buffer overflow via a specially crafted DHCP
packet.
5) Improper handling of malformed DHCP packets can be exploited to
execute arbitrary code via a specially crafted DHCP packet.
Successful exploitation of the vulnerabilities allow execution of
arbitrary code.
6) Improper starting of registered services can be exploited to gain
escalated privileges.
The vulnerabilities affect VMWare Workstation 6.0.0 and 5.5.4, VMWare
Player 2.0.0 and 1.0.4, VMWare Server 1.0.3, and VMWare ACE 2.0.0 and
1.0.3.
SOLUTION:
Update to the latest version or apply patches.
-- VMware ESX 3.0.1 --
Patch Bundle ESX-8258730:
http://www.vmware.com/support/vi3/doc/esx-8258730-patch.html
md5sum a06d0e36e403b0fe6bc6fbc76220a86d
-- VMware ESX 3.0.0 --
Patch Bundle ESX-4809553:
http://www.vmware.com/support/vi3/doc/esx-4809553-patch.html
md5sum cd363526aab5fa6c45bf2509cb5ae500
NOTE: The vendor recommends users to update to version 3.0.1 as 3.0.0
is nearing its End-of-life.
-- VMware ESX 2.5.4 --
Apply patch 10 (Build# 53326)
http://www.vmware.com/support/esx25/doc/esx-254-200708-patch.html
md5sum 8f29f906e0f3c8605a203f914f36b3d1
-- VMWare ESX 2.5.3 --
Apply patch 13 (Build# 52488)
http://www.vmware.com/support/esx25/doc/esx-253-200708-patch.html
md5sum 32ba19deb7af268ab357710145f8659b
NOTE: The vendor recommends users to update to version 2.5.4 or later
as 2.5.3 is nearing its End-of-life.
-- VMware ESX 2.1.3 --
Apply patch 8 (Build# 53228)
http://www.vmware.com/support/esx21/doc/esx-213-200708-patch.html
md5sum 32f9f87a99c5c801dd61492a9d91dfe2
NOTE: The vendor recommends users to update to version 2.5.4 or later
as 2.1.3 is nearing its End-of-life.
-- VMware ESX 2.0.2 --
Apply patch 8 (Build# 52650)
http://www.vmware.com/support/esx2/doc/esx-202-200708-patch.html
md5sum f36bb75b51f79e4ba2a2f01a71c3bb08
NOTE: The vendor recommends users to update to version 2.5.4 or later
as 2.0.2 is nearing its End-of-life.
-- VMware Workstation 6.0.0 --
Update to version 6.0.1 (Build# 55017)
http://www.vmware.com/download/ws/
-- VMware Workstation 5.5.4 --
Update to version 5.5.5 (Build# 56455)
http://www.vmware.com/download/ws/ws5.html
-- VMware Player 2.0.0 --
Update to version 2.0.1 (Build# 55017)
http://www.vmware.com/download/player/
-- VMware Player 1.0.4 --
Update to version 1.0.5 (Build# 56455)
http://www.vmware.com/download/player/
-- VMware Server 1.0.3 --
Update to version 1.0.4 (Build# 56528)
http://www.vmware.com/download/server/
-- VMware ACE 2.0.0 --
Update to version 2.0.1 (Build# 55017)
http://www.vmware.com/download/ace/
-- VMware ACE 1.0.3 --
Update to version 1.0.4 (Build# 54075)
http://www.vmware.com/download/ace/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1-2) Rafal Wojtczvk, McAfee
3-5) Neel Mehta and Ryan Smith, IBM ISS X-Force
6) Foundstone
CHANGELOG:
2007-09-20: Updated advisory and added additional links.
ORIGINAL ADVISORY:
VMWare:
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html#601
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#555
http://www.vmware.com/support/server/doc/releasenotes_server.html#resolved
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html#new_201
http://www.vmware.com/support/player/doc/releasenotes_player.html#105
http://www.vmware.com/support/player2/doc/releasenotes_player2.html#201
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
IBM ISS X-Force:
http://www.iss.net/threats/275.html
http://xforce.iss.net/xforce/xfdb/33103
http://xforce.iss.net/xforce/xfdb/33102
http://xforce.iss.net/xforce/xfdb/33101
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------