SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware Vendors:   VMware
VMware vmrun Utility Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1025270
SecurityTracker URL:  http://securitytracker.com/id/1025270
CVE Reference:   CVE-2011-1126   (Links to External Site)
Updated:  Mar 31 2011
Original Entry Date:  Mar 30 2011
Impact:   Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior
Description:   A vulnerability was reported in VMware. A local user can obtain elevated privileges on the target system.

On systems with certain non-standard filesystem configurations, a local user can place a specially crafted file into a predefined library path to cause vmrun to execute arbitrary code with elevated privileges.

The following versions are affected:

VMware VIX API for Linux 1.10.2 and earlier
VMware Workstation 7.1.3 on Linux and earlier
VMware Workstation 6.5.5 on Linux and earlier

Tim Brown reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix.

For VIX API: 1.10.3 or later

For Workstation 7.x: 7.1.4 build 385536 or later

For Workstation 6.5.x, see Knowledge Base article 1035509 for the updated version of vmrun.

The vendor's advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2011-0006.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2011-0006.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   None.


 Source Message Contents

Subject:  [Security-announce] VMSA-2011-0006 VMware vmrun utility local privilege escalation

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2011-0006
Synopsis:          VMware vmrun utility local privilege escalation
Issue date:        2011-03-29
Updated on:        2011-03-29 (initial release of advisory)
CVE numbers:       CVE-2011-1126
- ------------------------------------------------------------------------

1. Summary

   The VMware vmrun utility is susceptible to a local privilege
   escalation in non-standard configurations.

2. Relevant releases

   VMware VIX API for Linux 1.10.2 and earlier

   VMware Workstation 7.1.3 on Linux and earlier
   VMware Workstation 6.5.5 on Linux and earlier

3. Problem Description

 a. VMware Linux based vmrun utility local privilege escalation

    VMware vmrun is a utility that is used to perform various tasks on
    virtual machines. The vmrun utility runs on any platform with VIX
    libraries installed. It is installed in VMware Workstation by
    default.

    In non-standard filesystem configurations, an attacker with the
    ability to place files into a predefined library path, could take
    execution control of vmrun.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2011-1126 to this issue.

    VMware would like to thank Tim Brown for reporting this issue to
    us.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    VIX API        any       Windows  not affected
    VIX API        1.x       Linux    patch pending

    Workstation    7.x       Windows  not affected
    Workstation    7.x       Linux    7.1.4 build 385536 or later
    Workstation    6.5.x     Windows  not affected
    Workstation    6.5.x     Linux    updated version of vmrun *

    Player         any       any      not affected

    AMS            any       any      not affected

    Fusion         any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            any       ESX      not affected

   * Refer to VMware Knowledge Base article 1035509 for the updated
     version of vmrun for Workstation 6.5.x.


4. Solution

   Please review the patch/release notes for your product and version
   and verify the checksum of your downloaded file.

   Workstation 7.1.4
   -----------------
   For Linux
   http://www.vmware.com/downloads/download.do?downloadGroup=WKST-714-LX
   Release notes:
   https://www.vmware.com/support/ws71/doc/releasenotes_ws714.html

   Workstation for Linux 32-bit with VMware Tools
   md5sum: 5f5f25b1cfd8990e46db07788fe0adab
   sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9

   Workstation for Linux 32-bit without VMware Tools
   md5sum: 918e8f61eab4bec4c6ca03f72bdd8fb9
   sha1sum: 955b3a08375bb1fa39cb9c1c4142f13de604acf6

   Workstation for Linux 64-bit with VMware Tools
   md5sum: 68b424f836f63c12b071a791f80b1593
   sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6

   Workstation for Linux 64-bit without VMware Tools
   md5sum: f91a8c1ae911356b8eebf767db1a5873
   sha1sum: 58973839c0ff6f56a9d2371a1ca1b5189b3f7bc5

   Workstation 6.5.x - VMware Knowledge Base article 1035509
   ---------------------------------------------------------
   http://kb.vmware.com/kb/1035509


5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1126

- ------------------------------------------------------------------------
6. Change log

2011-03-29  VMSA-2011-0006
Initial security advisory in conjunction with the release of VMware
Workstation 7.1.4 and KB article 1035509.

- -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNksHgDEcm8Vbi9kMRAqd7AKDKutqA32AmEhpWYe+p0eYEChdNqQCgw+/6
iXPJUfF3YRukz0XvVLp5gG4=
=MCDq
-----END PGP SIGNATURE-----

_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
http://lists.vmware.com/mailman/listinfo/security-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC