Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   VMware Vendors:   VMware
VMware vmrun Command Format String Flaw Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1023835
SecurityTracker URL:
CVE Reference:   CVE-2010-1139   (Links to External Site)
Date:  Apr 9 2010
Impact:   Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): VIX API (Linux) 1.6.x, Workstation (Linux) 6.5.x, Player (Linux) 2.5.x, Server (Linux) 2.5, Fusion (Mac OS/X) 2.x
Description:   A vulnerability was reported in VMware. A local user can obtain elevated privileges on the target system.

A local user can execute a specially crafted vmrun command. Then, when the target user lists processes, arbitrary code may be executed on the target system with the privileges of the target user.

Linux-based systems are affected.

Thomas Toth-Steiner reported this vulnerability.

Impact:   A local user can cause arbitrary code to be executed with the privileges on the target user.
Solution:   The vendor has issued a fix (VIX API (Linux) 1.7, Workstation (Linux) 6.5.4 build 246459, Player (Linux) 2.5.4 build 246459, Fusion (Mac OS/X 2.0.7) build 246742).

The vendor's advisory will be available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error, State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC