SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware vCenter Vendors:   VMware
VMware vCenter Server and Tools Multiple Bugs Let Local Host System Users Obtain Passwords and Sensitive Information and Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1039013
SecurityTracker URL:  http://securitytracker.com/id/1039013
CVE Reference:   CVE-2015-5191, CVE-2017-4921, CVE-2017-4922, CVE-2017-4923   (Links to External Site)
Date:  Jul 28 2017
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): vCenter Server 6.5 VA; VMware Tools 9.x, 10.0.x
Description:   Several vulnerabilities were reported in VMware vCenter Server and Tools. A local user on the guest system can gain elevated privileges on the guest system. A local user on the host system can gain elevated privileges on the host system. A local user can obtain passwords and other potentially sensitive information on the target system.

A local user on the host system can exploit an insecure library loading flaw in the LD_LIBRARY_PATH variable and cause the target user to load an arbitrary shared library to obtain elevated privileges on the host system [CVE-2017-4921].

The service startup script uses directories with world writable permissions for storing critical information in temporary files [CVE-2017-4922]. A local user on the host system can access critical information when the service is restarted.

A local user can exploit a flaw in the vCenter Server Appliance file-based backup feature to obtain plaintext credentials [CVE-2017-4923].

A local user on the guest system can exploit several race conditions in VMware Tools libDeployPkg in the use of hard-coded paths in the /tmp directory to gain elevated privileges on the guest system [CVE-2015-5191].

Florian Weimer and Kurt Seifried of Red Hat Product Security, Thorsten Tullmann, researcher at Karlsruhe Institute of Technology, and Joe Womack of Expedia reported these vulnerabilities.

Impact:   A local user on the guest system can gain elevated privileges on the guest system.

A local user on the host system can gain elevated privileges on the host system.

A local user can obtain potentially sensitive information on the target system.

A local user can obtain passwords on the target system.

Solution:   VMware has issued a fix (vCenter Server 6.5 U1).

A fixed version of VMware Tools (10.0.9) is also available.

The VMware advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2017-0013.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2017-0013.html (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC