exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26890

Secunia Security Advisory 26890
Posted Sep 20, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in various VMware products, which can be exploited by malicious, local users to gain escalated privileges or cause a DoS (Denial of Service) or by malicious people to compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 08f09e82199488119ccb28852685050d7fedc7bb928e4f58a42631edb144d384

Secunia Security Advisory 26890

Change Mirror Download

----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/

----------------------------------------------------------------------

TITLE:
VMWare Products Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA26890

VERIFY ADVISORY:
http://secunia.com/advisories/26890/

CRITICAL:
Moderately critical

IMPACT:
Privilege escalation, DoS, System access

WHERE:
>From local network

REVISION:
1.1 originally posted 2007-09-20

OPERATING SYSTEM:
VMware ESX Server 3.x
http://secunia.com/product/10757/
VMware ESX Server 2.x
http://secunia.com/product/2125/

SOFTWARE:
VMware Workstation 5.x
http://secunia.com/product/5080/
VMware Workstation 6.x
http://secunia.com/product/14321/
VMware Player 1.x
http://secunia.com/product/6594/
VMWare Player 2.x
http://secunia.com/product/15771/
VMware Server 1.x
http://secunia.com/product/10733/
VMware ACE 1.x
http://secunia.com/product/6593/
VMWare ACE 2.x
http://secunia.com/product/15772/

DESCRIPTION:
Multiple vulnerabilities have been reported in various VMware
products, which can be exploited by malicious, local users to gain
escalated privileges or cause a DoS (Denial of Service) or by
malicious people to compromise a vulnerable system.

1) An unspecified error can be exploited by a user with
administrative privileges in the guest system to cause a memory
corruption on a certain host process.

Successful exploitation may allow execution of arbitrary code on the
host system.

2) An unspecified error can be exploited within the guest system to
cause a host process to crash.

The vulnerabilities affect VMWare ESX 3.0.1, 3.0.0, 2.5.4, 2.5.3,
2.1.3, and 2.0.2, VMWare Workstation 6.0.0 and 5.5.4, VMWare Player
2.0.0 and 1.0.4, VMWare Server 1.0.3, and VMWare ACE 2.0.0 and
1.0.3.

3) An integer underflow error in the DHCP server can be exploited to
cause a stack-based buffer overflow via a specially crafted DHCP
packet.

4) An integer overflow error in the DHCP server can be exploited to
cause a stack-based buffer overflow via a specially crafted DHCP
packet.

5) Improper handling of malformed DHCP packets can be exploited to
execute arbitrary code via a specially crafted DHCP packet.

Successful exploitation of the vulnerabilities allow execution of
arbitrary code.

6) Improper starting of registered services can be exploited to gain
escalated privileges.

The vulnerabilities affect VMWare Workstation 6.0.0 and 5.5.4, VMWare
Player 2.0.0 and 1.0.4, VMWare Server 1.0.3, and VMWare ACE 2.0.0 and
1.0.3.

SOLUTION:
Update to the latest version or apply patches.

-- VMware ESX 3.0.1 --

Patch Bundle ESX-8258730:
http://www.vmware.com/support/vi3/doc/esx-8258730-patch.html
md5sum a06d0e36e403b0fe6bc6fbc76220a86d


-- VMware ESX 3.0.0 --

Patch Bundle ESX-4809553:
http://www.vmware.com/support/vi3/doc/esx-4809553-patch.html
md5sum cd363526aab5fa6c45bf2509cb5ae500

NOTE: The vendor recommends users to update to version 3.0.1 as 3.0.0
is nearing its End-of-life.


-- VMware ESX 2.5.4 --
Apply patch 10 (Build# 53326)
http://www.vmware.com/support/esx25/doc/esx-254-200708-patch.html
md5sum 8f29f906e0f3c8605a203f914f36b3d1


-- VMWare ESX 2.5.3 --
Apply patch 13 (Build# 52488)
http://www.vmware.com/support/esx25/doc/esx-253-200708-patch.html
md5sum 32ba19deb7af268ab357710145f8659b

NOTE: The vendor recommends users to update to version 2.5.4 or later
as 2.5.3 is nearing its End-of-life.


-- VMware ESX 2.1.3 --
Apply patch 8 (Build# 53228)
http://www.vmware.com/support/esx21/doc/esx-213-200708-patch.html
md5sum 32f9f87a99c5c801dd61492a9d91dfe2

NOTE: The vendor recommends users to update to version 2.5.4 or later
as 2.1.3 is nearing its End-of-life.


-- VMware ESX 2.0.2 --
Apply patch 8 (Build# 52650)
http://www.vmware.com/support/esx2/doc/esx-202-200708-patch.html
md5sum f36bb75b51f79e4ba2a2f01a71c3bb08

NOTE: The vendor recommends users to update to version 2.5.4 or later
as 2.0.2 is nearing its End-of-life.


-- VMware Workstation 6.0.0 --
Update to version 6.0.1 (Build# 55017)
http://www.vmware.com/download/ws/


-- VMware Workstation 5.5.4 --
Update to version 5.5.5 (Build# 56455)
http://www.vmware.com/download/ws/ws5.html


-- VMware Player 2.0.0 --
Update to version 2.0.1 (Build# 55017)
http://www.vmware.com/download/player/


-- VMware Player 1.0.4 --
Update to version 1.0.5 (Build# 56455)
http://www.vmware.com/download/player/


-- VMware Server 1.0.3 --
Update to version 1.0.4 (Build# 56528)
http://www.vmware.com/download/server/


-- VMware ACE 2.0.0 --
Update to version 2.0.1 (Build# 55017)
http://www.vmware.com/download/ace/


-- VMware ACE 1.0.3 --
Update to version 1.0.4 (Build# 54075)
http://www.vmware.com/download/ace/

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1-2) Rafal Wojtczvk, McAfee
3-5) Neel Mehta and Ryan Smith, IBM ISS X-Force
6) Foundstone

CHANGELOG:
2007-09-20: Updated advisory and added additional links.

ORIGINAL ADVISORY:
VMWare:
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html#601
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#555
http://www.vmware.com/support/server/doc/releasenotes_server.html#resolved
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html#new_201
http://www.vmware.com/support/player/doc/releasenotes_player.html#105
http://www.vmware.com/support/player2/doc/releasenotes_player2.html#201
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html

IBM ISS X-Force:
http://www.iss.net/threats/275.html
http://xforce.iss.net/xforce/xfdb/33103
http://xforce.iss.net/xforce/xfdb/33102
http://xforce.iss.net/xforce/xfdb/33101

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close