VMwareProducts Code Execution and Denial of Service Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in various VMware products, which could be exploited by attackers or malicious users to cause a denial of service, gain elevated privileges, or execute arbitrary code.
1. An unspecified error in a guest virtual device driver, which could allow a guest operating system to crash the host, creating a denial of service condition.
2. Unspecified errors in an ioctl in "hcmon.sys", which could be exploited by a privileged Windows account to create a denial of service on a Windows-based host.
3. An error in the Virtual Machine Communication Interface (VMCI) driver (vmci.sys), which could allow privilege escalation on Windows-based machines (hosts and guests). VMware ESX is not affected.
4. Heap overflow errors in the VNnc Codec, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a malicious web page or opening a specially crafted video file. VMware ESX is not affected.
5. An error in the "vmware-authd" daemon when processing overly long data (e.g. username or password) sent to port 912/TCP, which could be exploited to crash an affected system and cause a denial of service.
6. A weakness is caused due to the password for VirtualCenter Server being present in the memory of the VI Client after logging in to VirtualCenter Server with VI Client.
7. An unspecified error in the ACE shared folders, which could allow a previously disabled and not removed shared folder in the guest to be enabled by a non ACE Administrator. The issues only affects VMware ACE.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
System / Technologies affected
- VMware Workstation version 6.5.1 and prior
- VMware Player version 2.5.1 and prior
- VMware ACE version 2.5.1 and prior
- VMware Server version 2.0
- VMware Server version 1.0.8 and prior
- VMware ESXi version 3.5
- VMware ESX version 3.5
- VMware ESX version 3.0.3
- VMware ESX version 3.0.2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to VMware Workstation version 6.5.2 :
http://www.vmware.com/download/ws/Upgrade to VMware Player version 2.5.2 :
http://www.vmware.com/download/player/Upgrade to VMware ACE version 2.5.2 :
http://www.vmware.com/download/ace/Upgrade to VMware Server version 2.0.1 or 1.0.9 :
http://www.vmware.com/download/server/Upgrade to VirtualCenter version 2.5 Update 4 :
http://www.vmware.com/download/download.doVMware ESXi 3.5 - Apply patches ESXe350-200811401-O-SG and ESXe350-200903201-O-UG :
http://download3.vmware.com/software/vi/ESXe350-200811401-O-SG.zip
http://download3.vmware.com/software/vi/ESXe350-200903201-O-UG.zipVMware ESX 3.5 - Apply patches ESX350-200811401-SG and ESX350-200903201-UG :
http://download3.vmware.com/software/vi/ESX350-200811401-SG.zip
http://download3.vmware.com/software/vi/ESX350-200903201-UG.zipVMware ESX 3.0.3 - Apply patch ESX303-200811401-BG :
http://download3.vmware.com/software/vi/ESX303-200811401-BG.zipVMware ESX 3.0.2 - Apply patch ESX-1006980 :
http://download3.vmware.com/software/vi/ESX-1006980.tgz
Vulnerability Identifier
- CVE-2008-3761
- CVE-2008-4916
- CVE-2009-0177
- CVE-2009-0518
- CVE-2009-0908
- CVE-2009-0909
- CVE-2009-0910
- CVE-2009-1146
- CVE-2009-1147
Source
Related Link
Share with