SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   VMware Vendors:   VMware, Inc.
VMware Workstation and Player Bugs Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1027742
SecurityTracker URL:  http://securitytracker.com/id/1027742
CVE Reference:   CVE-2012-3569, CVE-2012-5458, CVE-2012-5459   (Links to External Site)
Date:  Nov 9 2012
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation 8.0.4, Player 4.0.4, OVF Tool 2.1
Description:   Several vulnerabilities were reported in VMware Workstation and Player. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system.

VMware Workstation and Player assign weak security permissions when certain processes are created [CVE-2012-5458]. A local user may be able to gain control of those process threads to gain elevated privileges on the target host operating system.

Derek Soeder of Cylance, Inc. reported this vulnerability.

A remote user can create a specially crafted OVF file that, when loaded by the target user via the OVF Tool, will trigger a format string flaw and execute arbitrary code on the target user's system [CVE-2012-3569]. The code will run with the privileges of the target user.

Jeremy Brown of Microsoft reported this vulnerability.

A local user can place a specially crafted executable in a system folder on the host to cause arbitrary code to be executed on the target system [CVE-2012-5459].

Derek Soeder of Cylance, Inc. reported this vulnerability.

Impact:   A remote user can create a OVF file that, when loaded by the target user via the OVF Tool, will execute arbitrary code on the target user's system.

A local user can obtain elevated privileges on the target host operating system.

Solution:   The vendor has issued a fix (Workstation 8.0.5, Player 4.0.5, OVF Tool 3.0.1).

The vendor's advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2012-0015.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2012-0015.html (Links to External Site)
Cause:   Access control error, Input validation error, State error
Underlying OS:   Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Thu, 8 Nov 2012 18:02:21 -0800
Subject:  [Security-announce] VMware new security advisory

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2012-0015
Synopsis:    VMware Hosted Products and OVF Tool address security 
             issues
Issue date:  2012-11-08
Updated on:  2012-11-08 (initial advisory)
CVE number:  CVE-2012-5458, CVE-2012-5459 and CVE-2012-3569
- -----------------------------------------------------------------------
1. Summary

   VMware Hosted products and OVFTool patches address several security
   issues.

2. Relevant releases

   OVF Tool 2.1

   Workstation 8.0.4

   Player 4.0.4

3. Problem Description

    a. VMware Workstation and Player Weak permissions on process 
     threads vulnerability.

     Certain processes when created have weak security permissions
     assigned. It is possible to commandeer these process threads, 
     which could result in Elevation of Privilege in the context of the
     host.

     VMware would like to thank Derek Soeder of Cylance, Inc. for 
     reporting this issue to us.
    
     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CVE-2012-5458 to this issue.

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is
     available.

     VMware         Product   Running   Replace with/
     Product        Version   on        Apply Patch
     =============  ========  =======   =================
     vCenter        any       Windows   not affected

     Workstation    9.x       any       not affected
     Workstation    8.x       Windows   8.0.5
     Workstation    8.x       Linux     not affected
 
     Player         5.x       any       not affected
     Player         4.x       Windows   4.0.5 or later
     Player         4.x       Linux     not affected

     Fusion         any       Mac       not affected

     ESXi           any       ESXi      not affected

     ESX            any       ESX       not affected

    b. VMware Workstation and Player DLL binary planting vulnerability.

     Workstation and Player have a binary planting vulnerability. An
     attacker who can write their malicious executable to a system
     folder on the host, may be able to run code under certain 
     circumstances.

     VMware would like to thank Derek Soeder of Cylance, Inc. for
     reporting this issue to us.
    
     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CVE-2012-5459 to this issue.

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is
     available.

     VMware         Product   Running   Replace with/
     Product        Version   on        Apply Patch
     =============  ========  =======   =================
     vCenter        any       Windows   not affected

     Workstation    9.x       any       not affected
     Workstation    8.x       Windows   8.0.5
     Workstation    8.x       Linux     not affected

     Player         5.x       any       not affected
     Player         4.x       Windows   4.0.5 or later
     Player         4.x       Linux     not affected

     Fusion         any       Mac       not affected
 
     ESXi           any       ESXi      not affected

     ESX            any       ESX       not affected

    c. VMware OVF Tool format string vulnerability.

     The OVFTool has a format string vulnerability. Exploitation of
     this issue may lead to code execution. In order to exploit the
     issue, the attacker would need to trick the user into loading 
     their malicious OVF file.

     It is recommended that only OVF files from trusted sources should
     be used.

     VMware would like to thank Jeremy Brown of Microsoft for reporting
     this issue to us.

     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CVE-2012-3569 to this issue.

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is
     available.

     VMware         Product   Running   Replace with/
     Product        Version   on        Apply Patch
     =============  ========  =======   =================
     vCenter        any       Windows   not affected

     OVF Tool       3.x       any       not affected
     OVF Tool       2.1       Windows   OVF Tool 3.0.1
     OVF Tool       2.1       Linux/Mac not affected
     OVF Tool       2.0       any       not affected

     Workstation    9.x       any       not affected
     Workstation    8.x       Windows   8.0.5
     Workstation    8.x       Linux     not affected

     Player         5.x       any       not affected
     Player         4.x       Windows   4.0.5 or later
     Player         4.x       Linux     not affected

     Fusion         any       Mac       not affected

     ESXi           any       ESXi      not affected

     ESX            any       ESX       not affected

     Note: Workstation, Player and the vSphere Web Client (part of
     vCenter Server) use the OVF Tool to load OVF files. Other
     products, including vCenter Server (except vSPhere Web Client),
     ESX, and vCloud Director do not use the OVF Tool to parse OVF
     files.

4. Solution

     Please review the patch/release notes for your product and
     version and verify the checksum of your downloaded file.

     OVF Tool 3.0.1
     ------------

     https://www.vmware.com/support/developer/ovf/

     VMware Workstation 8.0.5
     ---------------------------

     https://www.vmware.com/go/downloadworkstation

     Release notes:
    
https://www.vmware.com/support/ws80/doc/releasenotes_workstation_805.html

     Player 4.0.5
     ---------------------------

     http://www.vmware.com/go/downloadplayer

     Release notes:
    
https://www.vmware.com/support/player40/doc/releasenotes_player405.html
 
5. References

     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5458
     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5459
     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3569

- -----------------------------------------------------------------------

6. Change log

     2012-11-08 VMSA-2012-0015
     Initial security advisory in conjunction with the release of 
     Workstation 8.0.5 and Player 4.0.5 on 2012-11-06.
- -----------------------------------------------------------------------

7. Contact

     E-mail list for product security notifications and announcements:
     http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

     This Security Advisory is posted to the following lists:

         * security-announce at lists.vmware.com
         * bugtraq at securityfocus.com
         * full-disclosure at lists.grok.org.uk

     E-mail:  security at vmware.com
     PGP key at: http://kb.vmware.com/kb/1055

     VMware Security Advisories
     http://www.vmware.com/security/advisories

     VMware security response policy
     http://www.vmware.com/support/policies/security_response.html

     General support life cycle policy
     http://www.vmware.com/support/policies/eos.html

     VMware Infrastructure support life cycle policy
     http://www.vmware.com/support/policies/eos_vi.html

     Copyright 2012 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 2599)
Charset: utf-8

wj8DBQFQnDcoDEcm8Vbi9kMRAubuAKCXOShZM729SICtvGouQCkgvgn3KACgsWob
OhHrZlCYJ57boo6QWc+Po5Q=
=inWK
-----END PGP SIGNATURE-----
_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
http://lists.vmware.com/mailman/listinfo/security-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC