SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware Vendors:   VMware
VMware Authorization Service Lets Remote Users Deny Service
SecurityTracker Alert ID:  1022997
SecurityTracker URL:  http://securitytracker.com/id/1022997
CVE Reference:   CVE-2009-3707   (Links to External Site)
Updated:  Apr 9 2010
Original Entry Date:  Oct 8 2009
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): Workstation 6.5.x, 7.0; Player 2.5.x, 3.0; Ace 2.5.x, 2.6
Description:   A vulnerability was reported in VMware. A remote user can cause denial of service conditions.

A remote user can send specially crafted format string characters as USER and PASS parameters to the 'vmware-authd.exe' authorization service to cause the target service to crash.

Windows-based versions of VMware Workstation, ACE, and Player are affected.

A demonstration exploit is available at:

http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html

The original advisory is available at:

http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php

shinnai reported this vulnerability.

Impact:   A remote user can cause the target authorization service to crash.
Solution:   The vendor has issued a fix (Workstation (Windows) 7.0.1 build 227600, 6.5.4 build 246459; Player (Windows) 3.0.1 build 227600, 2.5.4 build 246459; Ace (Windows) 2.6.1 build 227600; 2.5.4 build 246459).

The vendor's advisory will be available at:

http://www.vmware.com/security/advisories/

Vendor URL:  www.vmware.com/ (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC