SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   VMware vCenter Vendors:   VMware
VMware vCenter Server and Tools Multiple Bugs Let Local Host System Users Obtain Passwords and Sensitive Information and Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1039013
SecurityTracker URL:  http://securitytracker.com/id/1039013
CVE Reference:   CVE-2015-5191, CVE-2017-4921, CVE-2017-4922, CVE-2017-4923   (Links to External Site)
Date:  Jul 28 2017
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): vCenter Server 6.5 VA; VMware Tools 9.x, 10.0.x
Description:   Several vulnerabilities were reported in VMware vCenter Server and Tools. A local user on the guest system can gain elevated privileges on the guest system. A local user on the host system can gain elevated privileges on the host system. A local user can obtain passwords and other potentially sensitive information on the target system.

A local user on the host system can exploit an insecure library loading flaw in the LD_LIBRARY_PATH variable and cause the target user to load an arbitrary shared library to obtain elevated privileges on the host system [CVE-2017-4921].

The service startup script uses directories with world writable permissions for storing critical information in temporary files [CVE-2017-4922]. A local user on the host system can access critical information when the service is restarted.

A local user can exploit a flaw in the vCenter Server Appliance file-based backup feature to obtain plaintext credentials [CVE-2017-4923].

A local user on the guest system can exploit several race conditions in VMware Tools libDeployPkg in the use of hard-coded paths in the /tmp directory to gain elevated privileges on the guest system [CVE-2015-5191].

Florian Weimer and Kurt Seifried of Red Hat Product Security, Thorsten Tullmann, researcher at Karlsruhe Institute of Technology, and Joe Womack of Expedia reported these vulnerabilities.

Impact:   A local user on the guest system can gain elevated privileges on the guest system.

A local user on the host system can gain elevated privileges on the host system.

A local user can obtain potentially sensitive information on the target system.

A local user can obtain passwords on the target system.

Solution:   VMware has issued a fix (vCenter Server 6.5 U1).

A fixed version of VMware Tools (10.0.9) is also available.

The VMware advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2017-0013.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2017-0013.html (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC