Vulnerabilities > CVE-2007-5671 - Improper Input Validation vulnerability in VMWare products

047910
CVSS 4.4 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
vmware
CWE-20
nessus

Summary

HGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Nessus

  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2008-0009.NASL
    descriptiona. VMware Tools Local Privilege Escalation on Windows-based guest OS The VMware Tools Package provides support required for shared folders (HGFS) and other features. An input validation error is present in the Windows-based VMware HGFS.sys driver. Exploitation of this flaw might result in arbitrary code execution on the guest system by an unprivileged guest user. It doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id40378
    published2009-07-27
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40378
    titleVMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from VMware Security Advisory 2008-0009. 
    # The text itself is copyright (C) VMware Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(40378);
      script_version("1.26");
      script_cvs_date("Date: 2018/08/06 14:03:16");
    
      script_cve_id("CVE-2006-1721", "CVE-2007-4772", "CVE-2007-5137", "CVE-2007-5378", "CVE-2007-5671", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0553", "CVE-2008-0888", "CVE-2008-0948", "CVE-2008-0967", "CVE-2008-2097", "CVE-2008-2100");
      script_bugtraq_id(27163, 27655, 28288, 28302, 28303, 29557);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues");
      script_summary(english:"Checks esxupdate output for the patches");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote VMware ESXi / ESX host is missing one or more
    security-related patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "a. VMware Tools Local Privilege Escalation on Windows-based guest OS
    
       The VMware Tools Package provides support required for shared folders
       (HGFS) and other features.
    
       An input validation error is present in the Windows-based VMware
       HGFS.sys driver.   Exploitation of this flaw might result in
       arbitrary code execution on the guest system by an unprivileged
       guest user.  It doesn't matter on what host the Windows guest OS
       is running, as this is a guest driver vulnerability and not a
       vulnerability on the host.
    
       The HGFS.sys driver is present in the guest operating system if the
       VMware Tools package is loaded.  Even if the host has HGFS disabled
       and has no shared folders, Windows-based guests may be affected. This
       is regardless if a host supports HGFS.
    
       This issue could be mitigated by removing the VMware Tools package
       from Windows based guests.  However this is not recommended as it
       would impact usability of the product.
    
       NOTE: Installing the new hosted release or ESX patches will not
             remediate the issue.  The VMware Tools packages will need
             to be updated on each Windows-based guest followed by a
             reboot of the guest system.
    
       VMware would like to thank iDefense and Stephen Fewer of Harmony
       Security for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2007-5671 to this issue.
    
    b. Privilege escalation on ESX or Linux based hosted operating systems
    
       This update fixes a security issue related to local exploitation of
       an untrusted library path vulnerability in vmware-authd. In order to
       exploit this vulnerability, an attacker must have local access and
       the ability to execute the set-uid vmware-authd binary on an affected
       system. Exploitation of this flaw might result in arbitrary code
       execution on the Linux host system by an unprivileged user.
    
       VMware would like to thank iDefense for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0967 to this issue.
    
    c. Openwsman Invalid Content-Length Vulnerability
    
       Openwsman is a system management platform that implements the Web
       Services Management protocol (WS-Management). It is installed and
       running by default. It is used in the VMware Management Service
       Console and in ESXi.
    
       The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
       to a privilege escalation vulnerability, which may allow users with
       non-privileged ESX or Virtual Center accounts to gain root privileges.
    
       To exploit this vulnerability, an attacker would need a local ESX
       account or a VirtualCenter account with the Host.Cim.CimInteraction
       permission.
    
       Systems with no local ESX accounts and no VirtualCenter accounts with
       the Host.Cim.CimInteraction permission are not vulnerable.
    
       This vulnerability cannot be exploited by users without valid login
       credentials.
    
       Discovery: Alexander Sotirov, VMware Security Research
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2097 to this issue.
    
    d. VMware VIX Application Programming Interface (API) Memory Overflow
       Vulnerabilities
    
       The VIX API (also known as 'Vix') is an API that lets users write scripts
       and programs to manipulate virtual machines.
    
       Multiple buffer overflow vulnerabilities are present in the VIX API.
       Exploitation of these vulnerabilities might result in a privilege
       escalation on the host system. This exploit scenario is relevant for all
       affected products. On VC, ESX30x, and ESX35, users need to have the VM
       Interaction Privilege in order to exploit the vulnerability.
    
       Exploitation of these vulnerabilities might also result in code execution on
       the host system from the guest system or on the service console in ESX Server
       from the guest operating system. This exploit scenario is relevant for
       Workstation 6.0.x (version 6.0.3 and below), Player 2.0.x (version 2.0.3 and
       below), ACE 2.0.x (version 2.0.3 and below), Server 1.0.x (version 1.0.5 and
       below), and ESX3.5. The parameter 'vix.inGuest.enable' in the VMware
       configuration file must be set to true to allow for exploitation on these
       products. Note that the parameter 'vix-inGuest.enable' is set to false by
       default.
    
       The parameter 'vix.inGuest.enable' is present in the
       following products :
    
         VMware Workstation 6.0.2 and higher
         VMware ACE 6.0.2 and higher
         VMware Server 1.06 and higher
         VMware Fusion 1.1.2 and higher
         ESX Server 3.0 and higher
         ESX Server 3.5 and higher
    
       In previous versions of VMware products where the VIX API was introduced,
       the VIX API couldn't be disabled.
    
       This vulnerability is present in ESX and the hosted products even if you
       have not installed the VIX API. To patch your system you will need to
       update to the new hosted product version or to apply the appropriate ESX
       patch. It is not necessary to update the VIX API if you have installed
       the VIX API.
    
       VMware would like to thank Andrew Honig of the Department of
       Defense for reporting this issue.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2100 to this issue.
    
    II Service Console rpm updates
    
     NOTE: ESXi and hosted products are not affected by any service console
           security updates
    
     a. Security update for cyrus-sasl
    
       Updated cyrus-sasl package for the ESX Service Console corrects a security
       issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
       implementation of Simple Authentication and Security Layer (SASL). As a
       result of this issue in the authentication mechanism, a remote
       unauthenticated attacker might be able to cause a denial of service error
       on the service console.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2006-1721 to this issue.
    
     b. Security update for tcltk
    
       An input validation flaw was discovered in Tk's GIF image handling. A
       code-size value read from a GIF image was not properly validated before
       being used, leading to a buffer overflow. A specially crafted GIF file
       could use this to cause a crash or, potentially, execute code with the
       privileges of the application using the Tk graphical toolkit.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0553 to this issue.
    
       A buffer overflow flaw was discovered in Tk's animated GIF image handling.
       An animated GIF containing an initial image smaller than subsequent images
       could cause a crash or, potentially, execute code with the privileges of
       the application using the Tk library.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-5378 to this issue.
    
       A flaw first discovered in the Tcl regular expression engine used in the
       PostgreSQL database server, resulted in an infinite loop when processing
       certain regular expressions.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-4772 to this issue.
    
     c. Security update for unzip
    
       This patch includes a moderate security update to the service console that
       fixes a flaw in unzip. An attacker could execute malicious code with a
       user's privileges if the user ran unzip on a file designed to leverage
       this flaw.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0888 to this issue.
    
     d. Security update for krb5
    
       KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable
       for some krb4 message types, which allows remote attackers to
       cause a denial of service (crash) and possibly execute arbitrary
       code via crafted messages that trigger a NULL pointer dereference
       or double-free.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0062 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not
       properly clear the unused portion of a buffer when generating an
       error message, which might allow remote attackers to obtain
       sensitive information, aka 'Uninitialized stack values.'
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0063 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used
       by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably
       other versions before 1.3, when running on systems whose unistd.h
       does not define the FD_SETSIZE macro, allows remote attackers to cause
       a denial of service (crash) and possibly execute arbitrary code by
       triggering a large number of open file descriptors.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0948 to this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.vmware.com/pipermail/security-announce/2008/000022.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply the missing patches.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 119, 189, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:3.5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/27");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
      script_family(english:"VMware ESX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/VMware/release", "Host/VMware/version");
      script_require_ports("Host/VMware/esxupdate", "Host/VMware/esxcli_software_vibs");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("vmware_esx_packages.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/VMware/release")) audit(AUDIT_OS_NOT, "VMware ESX / ESXi");
    if (
      !get_kb_item("Host/VMware/esxcli_software_vibs") &&
      !get_kb_item("Host/VMware/esxupdate")
    ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    init_esx_check(date:"2008-06-04");
    flag = 0;
    
    
    if (esx_check(ver:"ESX 2.5.4", patch:"19")) flag++;
    
    if (esx_check(ver:"ESX 2.5.5", patch:"8")) flag++;
    
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004186")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004189")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004190")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004721")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004723")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004725")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004728")) flag++;
    
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004216")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004219")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004719")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004722")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004724")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004726")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004727")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004821")) flag++;
    
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805504-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805505-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805506-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805507-SG",
        patch_updates : make_list("ESX350-201006408-SG", "ESX350-201008411-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805508-SG",
        patch_updates : make_list("ESX350-200911210-UG", "ESX350-200912406-BG", "ESX350-201006409-BG", "ESX350-201105403-BG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805515-SG",
        patch_updates : make_list("ESX350-200911201-UG", "ESX350-201006401-SG", "ESX350-201203401-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805501-I-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805502-T-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805503-C-SG")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201209-25.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201209-25 (VMware Player, Server, Workstation: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VMware Player, Server, and Workstation. Please review the CVE identifiers referenced below for details. Impact : Local users may be able to gain escalated privileges, cause a Denial of Service, or gain sensitive information. A remote attacker could entice a user to open a specially crafted file, possibly resulting in the remote execution of arbitrary code, or a Denial of Service. Remote attackers also may be able to spoof DNS traffic, read arbitrary files, or inject arbitrary web script to the VMware Server Console. Furthermore, guest OS users may be able to execute arbitrary code on the host OS, gain escalated privileges on the guest OS, or cause a Denial of Service (crash the host OS). Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id62383
    published2012-10-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62383
    titleGLSA-201209-25 : VMware Player, Server, Workstation: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201209-25.
    #
    # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(62383);
      script_version("1.24");
      script_cvs_date("Date: 2019/11/12");
    
      script_cve_id("CVE-2007-5269", "CVE-2007-5503", "CVE-2007-5671", "CVE-2008-0967", "CVE-2008-1340", "CVE-2008-1361", "CVE-2008-1362", "CVE-2008-1363", "CVE-2008-1364", "CVE-2008-1392", "CVE-2008-1447", "CVE-2008-1806", "CVE-2008-1807", "CVE-2008-1808", "CVE-2008-2098", "CVE-2008-2100", "CVE-2008-2101", "CVE-2008-4915", "CVE-2008-4916", "CVE-2008-4917", "CVE-2009-0040", "CVE-2009-0909", "CVE-2009-0910", "CVE-2009-1244", "CVE-2009-2267", "CVE-2009-3707", "CVE-2009-3732", "CVE-2009-3733", "CVE-2009-4811", "CVE-2010-1137", "CVE-2010-1138", "CVE-2010-1139", "CVE-2010-1140", "CVE-2010-1141", "CVE-2010-1142", "CVE-2010-1143", "CVE-2011-3868");
      script_bugtraq_id(25956, 26650, 28276, 28289, 29444, 29552, 29557, 29637, 29639, 29640, 29641, 30131, 30937, 32168, 32597, 33827, 33990, 34373, 34471, 36630, 36841, 36842, 39104, 39392, 39394, 39395, 39396, 39397, 39407, 39949, 49942);
      script_xref(name:"GLSA", value:"201209-25");
      script_xref(name:"IAVA", value:"2008-A-0045");
    
      script_name(english:"GLSA-201209-25 : VMware Player, Server, Workstation: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201209-25
    (VMware Player, Server, Workstation: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in VMware Player, Server,
          and Workstation. Please review the CVE identifiers referenced below for
          details.
      
    Impact :
    
        Local users may be able to gain escalated privileges, cause a Denial of
          Service, or gain sensitive information.
        A remote attacker could entice a user to open a specially crafted file,
          possibly resulting in the remote execution of arbitrary code, or a Denial
          of Service. Remote attackers also may be able to spoof DNS traffic, read
          arbitrary files, or inject arbitrary web script to the VMware Server
          Console.
        Furthermore, guest OS users may be able to execute arbitrary code on the
          host OS, gain escalated privileges on the guest OS, or cause a Denial of
          Service (crash the host OS).
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201209-25"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Gentoo discontinued support for VMware Player. We recommend that users
          unmerge VMware Player:
          # emerge --unmerge 'app-emulation/vmware-player'
        NOTE: Users could upgrade to
          “>=app-emulation/vmware-player-3.1.5”, however these packages are
          not currently stable.
        Gentoo discontinued support for VMware Workstation. We recommend that
          users unmerge VMware Workstation:
          # emerge --unmerge 'app-emulation/vmware-workstation'
        NOTE: Users could upgrade to
          “>=app-emulation/vmware-workstation-7.1.5”, however these packages
          are not currently stable.
        Gentoo discontinued support for VMware Server. We recommend that users
          unmerge VMware Server:
          # emerge --unmerge 'app-emulation/vmware-server'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploithub_sku", value:"EH-14-757");
      script_set_attribute(attribute:"exploit_framework_exploithub", value:"true");
      script_set_attribute(attribute:"d2_elliot_name", value:"Vmware Server File Disclosure");
      script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
      script_cwe_id(16, 20, 22, 94, 119, 134, 189, 200, 264, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vmware-player");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vmware-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vmware-workstation");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/10/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/09/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/10/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"app-emulation/vmware-server", unaffected:make_list(), vulnerable:make_list("le 1.0.9.156507"))) flag++;
    if (qpkg_check(package:"app-emulation/vmware-workstation", unaffected:make_list(), vulnerable:make_list("le 6.5.5.328052"))) flag++;
    if (qpkg_check(package:"app-emulation/vmware-player", unaffected:make_list(), vulnerable:make_list("le 2.5.5.328052"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "VMware Player / Server / Workstation");
    }
    
  • NASL familyWindows
    NASL idVMWARE_MULTIPLE_VMSA_2008_0009.NASL
    descriptionA VMware product installed on the remote host is affected by multiple vulnerabilities. - A local privilege escalation issue in
    last seen2020-06-01
    modified2020-06-02
    plugin id33105
    published2008-06-09
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33105
    titleVMware Products Multiple Vulnerabilities (VMSA-2008-0009)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33105);
      script_version("1.19");
     script_cvs_date("Date: 2018/11/15 20:50:29");
    
      script_cve_id("CVE-2007-5671", "CVE-2008-2100");
      script_bugtraq_id(29552, 29549);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMware Products Multiple Vulnerabilities (VMSA-2008-0009)");
      script_summary(english:"Checks vulnerable versions of multiple VMware products");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host has an application that is affected by
    multiple issues.");
     script_set_attribute(attribute:"description", value:
    "A VMware product installed on the remote host is affected by multiple
    vulnerabilities.
    
      - A local privilege escalation issue in 'HGFS.sys' driver
        included with the VMware Tools package, could allow an
        unprivileged guest user to execute arbitrary code on the
        guest system. It should be noted that installing the new
        releases of the affected product will not resolve the
        issue. In order to successfully apply this patch VMware
        Tools package should be updated on each Windows based
        guest followed by a reboot of the guest system.
        (CVE-2007-5671)
    
      - Multiple buffer overflow vulnerabilities in VMware VIX
        API, which is disabled by default, could allow arbitrary
        code execution on the host system from the guest
        operating system. (CVE-2008-2100)");
      # http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=712
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?58ed8a38");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2008-0009.html" );
      script_set_attribute(attribute:"solution", value:
    "Upgrade to :
    
      - VMware Workstation 6.0.4/5.5.7 or higher.
      - VMware Player 2.0.4/1.0.6 or higher.
      - VMware Server 1.0.6 or higher.
      - VMware ACE 2.0.4 or higher.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 119);
    
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/09");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:ace");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_player");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_server");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_workstation");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
    
      script_dependencies("vmware_workstation_detect.nasl","vmware_server_win_detect.nasl", "vmware_player_detect.nasl","vmware_ace_detect.nasl");
      script_require_ports("VMware/Server/Version", "VMware/ACE/Version", "VMware/Player/Version", "VMware/Workstation/Version", 139, 445);
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("smb_func.inc");
    
    port = kb_smb_transport();
    
    # Check for VMware Workstation
    
    version = get_kb_item("VMware/Workstation/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
    
     if (( int(v[0]) < 5 ) ||
         ( int(v[0]) == 5 && int(v[1]) < 5 ) ||
         ( int(v[0]) == 5 && int(v[1]) == 5 && int(v[2]) < 7 ) ||
         ( int(v[0]) == 6 && int(v[1]) == 0 && int(v[2]) < 4 )
       )
         {
          if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",version," of VMware Workstation is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
       	 security_hole(port);
         }
    }
    
    # Check for VMware Server
    
    version = get_kb_item("VMware/Server/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
     if ( ( int(v[0]) < 1 ) ||
          ( int(v[0]) == 1  && int(v[1]) == 0 && int(v[2]) < 6 )
        )
       {
         if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",version," of VMware Server is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
        	security_hole(port);
        }
    }
    
    # Check for VMware Player
    
    version = get_kb_item("VMware/Player/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
     if ( ( int(v[0]) < 1 ) ||
          ( int(v[0]) == 1  && int(v[1]) == 0 && int(v[2]) < 6 ) ||
          ( int(v[0]) == 2  && int(v[1]) == 0 && int(v[2]) < 4 )
        )
       {
         if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",version," of VMware Player is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
            security_hole(port);
        }
    }
    
    # Check for VMware ACE.
    version = get_kb_item("VMware/ACE/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
     if (( int(v[0]) == 2  && int(v[1]) == 0 && int(v[2]) < 4 ))
      {
        if (report_verbosity)
        {
          report = string(
             "\n",
             "Version ",version," of VMware ACE is installed on the remote host.",
             "\n"
          );
          security_hole(port:port, extra:report);
        }
        else
           security_hole(port);
      }
    }
    

Oval

  • accepted2010-05-17T04:00:02.929-04:00
    classvulnerability
    contributors
    • nameMichael Wood
      organizationHewlett-Packard
    • nameJ. Daniel Brown
      organizationDTCC
    definition_extensions
    • commentVMWare ESX Server 3.0.2 is installed
      ovaloval:org.mitre.oval:def:5613
    • commentVMWare ESX Server 3.0.1 is installed
      ovaloval:org.mitre.oval:def:5367
    descriptionHGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges.
    familyunix
    idoval:org.mitre.oval:def:5358
    statusaccepted
    submitted2008-06-10T15:10:44.000-05:00
    titleVMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain Elevated Privileges
    version7
  • accepted2010-05-17T04:00:05.791-04:00
    classvulnerability
    contributors
    • nameMichael Wood
      organizationHewlett-Packard
    • nameJ. Daniel Brown
      organizationDTCC
    definition_extensions
    • commentVMWare ESX Server 3.0.2 is installed
      ovaloval:org.mitre.oval:def:5613
    • commentVMWare ESX Server 3.0.1 is installed
      ovaloval:org.mitre.oval:def:5367
    descriptionHGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges.
    familyunix
    idoval:org.mitre.oval:def:5688
    statusaccepted
    submitted2008-06-10T15:10:44.000-05:00
    titleVMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain Elevated Privileges
    version5