Vulnerabilities > CVE-2008-2100 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in VMWare products

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
vmware
CWE-119
nessus

Summary

Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyWindows
    NASL idVMWARE_VIX_API_BUFFER_OVERFLOW.NASL
    descriptionVMware VIX, an application programming interface to manipulate virtual machines is installed on the remote host. The installed version of VMware VIX API is affected by multiple buffer overflow vulnerabilities. Successful exploitation of these issues could allow arbitrary code execution on the host operating system from the guest system.
    last seen2020-06-01
    modified2020-06-02
    plugin id33106
    published2008-06-09
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33106
    titleVMware VIX API Multiple Buffer Overflow Vulnerabilities
    code
    #
    #  (C) Tenable Network Security, Inc.
    #
    
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33106);
      script_version("1.16");
     script_cvs_date("Date: 2018/11/15 20:50:29");
    
      script_cve_id("CVE-2008-2100");
      script_bugtraq_id(29552);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMware VIX API Multiple Buffer Overflow Vulnerabilities");
      script_summary(english:"Checks if vulnerable version of VIX API is installed");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote host contains an application that is affected by multiple
    buffer overflow vulnerabilities.");
     script_set_attribute(attribute:"description", value:
    "VMware VIX, an application programming interface to manipulate virtual
    machines is installed on the remote host.
    
    The installed version of VMware VIX API is affected by multiple buffer
    overflow vulnerabilities. Successful exploitation of these issues
    could allow arbitrary code execution on the host operating system from
    the guest system.");
     script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2008-0009.html");
     script_set_attribute(attribute:"solution", value:"Upgrade to VMware VIX API 1.1.4 or higher.");
     script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_cwe_id(119);
    
     script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/09");
    
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:ace");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:esx_server");
    script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:fusion");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:player");
    script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:server");
    script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_workstation");
    script_end_attributes();
    
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
    
      script_dependencies("smb_hotfixes.nasl");
      script_require_keys("SMB/Registry/Enumerated");
      script_require_ports(139, 445);
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("smb_func.inc");
    include("audit.inc");
    
    # Figure out where the installer recorded information about it.
    
    list = get_kb_list("SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/*/DisplayName");
    if (isnull(list)) exit(0);
    
    installstring = NULL;
    foreach name (keys(list))
    {
      prod = list[name];
      if (prod &&  "VMware VIX" >< prod)
      {
       installstring = ereg_replace(pattern:"^SMB\/Registry\/HKLM\/(SOFTWARE\/Microsoft\/Windows\/CurrentVersion\/Uninstall\/.+)\/DisplayName$", replace:"\1", string:name);
       installstring = str_replace(find:"/", replace:"\", string:installstring);
       installstring1 = ereg_replace(pattern:"^(SMB\/Registry\/HKLM\/SOFTWARE\/Microsoft\/Windows\/CurrentVersion\/Uninstall\/.+)\/DisplayName$", replace:"\1", string:name);
       break;
      }
    }
    
    if(isnull(installstring) || isnull(installstring1)) exit(0);
    
    
    vix_version = get_kb_item(string(installstring1,"/","DisplayVersion"));
    
    if (isnull(vix_version)) exit(0);
    
    
    # Get the install path
    
    name    =  kb_smb_name();
    port      =  kb_smb_transport();
    login     =  kb_smb_login();
    pass     =  kb_smb_password();
    domain  =  kb_smb_domain();
    
    
    
    
    if(! smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');
    rc = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$");
    if (rc != 1)
    {
      NetUseDel();
      exit(0);
    }
    
    hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);
    if (isnull(hklm))
    {
      NetUseDel();
      exit(0);
    }
    
    key = installstring;
    path = NULL;
    
    
    key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);
    if (!isnull(key_h))
    {
      # If VMware VIX is installed...
      item = RegQueryValue(handle:key_h, item:"InstallLocation");
      if (!isnull(item))
      {
        path = item[1];
      }
      RegCloseKey(handle:key_h);
    }
    RegCloseKey(handle:hklm);
    
    
    if (!path)
    {
     NetUseDel();
     exit(0);
    }
    
    # Check if one of the VIX dll is present.
    
    share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:path);
    dll =  ereg_replace(pattern:"^[A-Za-z]:(.*)[\\]*$", replace:"\1\VixCOM.dll", string:path);
    
    NetUseDel(close:FALSE);
    
    rc = NetUseAdd(login:login, password:pass, domain:domain, share:share);
    if (rc != 1)
    {
     NetUseDel();
     exit(0);
    }
    
    fh = CreateFile(file:dll,
    	desired_access:GENERIC_READ,
    	file_attributes:FILE_ATTRIBUTE_NORMAL,
    	share_mode:FILE_SHARE_READ,
    	create_disposition:OPEN_EXISTING);
    
    ver = NULL;
    if (!isnull(fh))
    {
      ver = GetFileVersion(handle:fh);
      CloseFile(handle:fh);
    }
    
    NetUseDel();
    
    
    if(!isnull(ver))
    {
     # Ok, so we could get version for one of the VIX dll's. Now
     # set the kb for vix version we obtained from the registry.
    
     set_kb_item(name:"VMware/VIX/Version", value:vix_version);
     v = split(vix_version, sep:".", keep:FALSE);
    
     if (( int(v[0]) < 1 ) ||
         ( int(v[0]) == 1 && int(v[1])  < 1 ) ||
         ( int(v[0]) == 1 && int(v[1]) == 1 && int(v[2]) < 4)
         )
         {
          if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",vix_version," of VMware VIX API is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
       	 security_hole(port);
         }
    }
    
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2008-0009.NASL
    descriptiona. VMware Tools Local Privilege Escalation on Windows-based guest OS The VMware Tools Package provides support required for shared folders (HGFS) and other features. An input validation error is present in the Windows-based VMware HGFS.sys driver. Exploitation of this flaw might result in arbitrary code execution on the guest system by an unprivileged guest user. It doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id40378
    published2009-07-27
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40378
    titleVMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from VMware Security Advisory 2008-0009. 
    # The text itself is copyright (C) VMware Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(40378);
      script_version("1.26");
      script_cvs_date("Date: 2018/08/06 14:03:16");
    
      script_cve_id("CVE-2006-1721", "CVE-2007-4772", "CVE-2007-5137", "CVE-2007-5378", "CVE-2007-5671", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0553", "CVE-2008-0888", "CVE-2008-0948", "CVE-2008-0967", "CVE-2008-2097", "CVE-2008-2100");
      script_bugtraq_id(27163, 27655, 28288, 28302, 28303, 29557);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues");
      script_summary(english:"Checks esxupdate output for the patches");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote VMware ESXi / ESX host is missing one or more
    security-related patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "a. VMware Tools Local Privilege Escalation on Windows-based guest OS
    
       The VMware Tools Package provides support required for shared folders
       (HGFS) and other features.
    
       An input validation error is present in the Windows-based VMware
       HGFS.sys driver.   Exploitation of this flaw might result in
       arbitrary code execution on the guest system by an unprivileged
       guest user.  It doesn't matter on what host the Windows guest OS
       is running, as this is a guest driver vulnerability and not a
       vulnerability on the host.
    
       The HGFS.sys driver is present in the guest operating system if the
       VMware Tools package is loaded.  Even if the host has HGFS disabled
       and has no shared folders, Windows-based guests may be affected. This
       is regardless if a host supports HGFS.
    
       This issue could be mitigated by removing the VMware Tools package
       from Windows based guests.  However this is not recommended as it
       would impact usability of the product.
    
       NOTE: Installing the new hosted release or ESX patches will not
             remediate the issue.  The VMware Tools packages will need
             to be updated on each Windows-based guest followed by a
             reboot of the guest system.
    
       VMware would like to thank iDefense and Stephen Fewer of Harmony
       Security for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2007-5671 to this issue.
    
    b. Privilege escalation on ESX or Linux based hosted operating systems
    
       This update fixes a security issue related to local exploitation of
       an untrusted library path vulnerability in vmware-authd. In order to
       exploit this vulnerability, an attacker must have local access and
       the ability to execute the set-uid vmware-authd binary on an affected
       system. Exploitation of this flaw might result in arbitrary code
       execution on the Linux host system by an unprivileged user.
    
       VMware would like to thank iDefense for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0967 to this issue.
    
    c. Openwsman Invalid Content-Length Vulnerability
    
       Openwsman is a system management platform that implements the Web
       Services Management protocol (WS-Management). It is installed and
       running by default. It is used in the VMware Management Service
       Console and in ESXi.
    
       The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
       to a privilege escalation vulnerability, which may allow users with
       non-privileged ESX or Virtual Center accounts to gain root privileges.
    
       To exploit this vulnerability, an attacker would need a local ESX
       account or a VirtualCenter account with the Host.Cim.CimInteraction
       permission.
    
       Systems with no local ESX accounts and no VirtualCenter accounts with
       the Host.Cim.CimInteraction permission are not vulnerable.
    
       This vulnerability cannot be exploited by users without valid login
       credentials.
    
       Discovery: Alexander Sotirov, VMware Security Research
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2097 to this issue.
    
    d. VMware VIX Application Programming Interface (API) Memory Overflow
       Vulnerabilities
    
       The VIX API (also known as 'Vix') is an API that lets users write scripts
       and programs to manipulate virtual machines.
    
       Multiple buffer overflow vulnerabilities are present in the VIX API.
       Exploitation of these vulnerabilities might result in a privilege
       escalation on the host system. This exploit scenario is relevant for all
       affected products. On VC, ESX30x, and ESX35, users need to have the VM
       Interaction Privilege in order to exploit the vulnerability.
    
       Exploitation of these vulnerabilities might also result in code execution on
       the host system from the guest system or on the service console in ESX Server
       from the guest operating system. This exploit scenario is relevant for
       Workstation 6.0.x (version 6.0.3 and below), Player 2.0.x (version 2.0.3 and
       below), ACE 2.0.x (version 2.0.3 and below), Server 1.0.x (version 1.0.5 and
       below), and ESX3.5. The parameter 'vix.inGuest.enable' in the VMware
       configuration file must be set to true to allow for exploitation on these
       products. Note that the parameter 'vix-inGuest.enable' is set to false by
       default.
    
       The parameter 'vix.inGuest.enable' is present in the
       following products :
    
         VMware Workstation 6.0.2 and higher
         VMware ACE 6.0.2 and higher
         VMware Server 1.06 and higher
         VMware Fusion 1.1.2 and higher
         ESX Server 3.0 and higher
         ESX Server 3.5 and higher
    
       In previous versions of VMware products where the VIX API was introduced,
       the VIX API couldn't be disabled.
    
       This vulnerability is present in ESX and the hosted products even if you
       have not installed the VIX API. To patch your system you will need to
       update to the new hosted product version or to apply the appropriate ESX
       patch. It is not necessary to update the VIX API if you have installed
       the VIX API.
    
       VMware would like to thank Andrew Honig of the Department of
       Defense for reporting this issue.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2100 to this issue.
    
    II Service Console rpm updates
    
     NOTE: ESXi and hosted products are not affected by any service console
           security updates
    
     a. Security update for cyrus-sasl
    
       Updated cyrus-sasl package for the ESX Service Console corrects a security
       issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
       implementation of Simple Authentication and Security Layer (SASL). As a
       result of this issue in the authentication mechanism, a remote
       unauthenticated attacker might be able to cause a denial of service error
       on the service console.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2006-1721 to this issue.
    
     b. Security update for tcltk
    
       An input validation flaw was discovered in Tk's GIF image handling. A
       code-size value read from a GIF image was not properly validated before
       being used, leading to a buffer overflow. A specially crafted GIF file
       could use this to cause a crash or, potentially, execute code with the
       privileges of the application using the Tk graphical toolkit.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0553 to this issue.
    
       A buffer overflow flaw was discovered in Tk's animated GIF image handling.
       An animated GIF containing an initial image smaller than subsequent images
       could cause a crash or, potentially, execute code with the privileges of
       the application using the Tk library.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-5378 to this issue.
    
       A flaw first discovered in the Tcl regular expression engine used in the
       PostgreSQL database server, resulted in an infinite loop when processing
       certain regular expressions.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-4772 to this issue.
    
     c. Security update for unzip
    
       This patch includes a moderate security update to the service console that
       fixes a flaw in unzip. An attacker could execute malicious code with a
       user's privileges if the user ran unzip on a file designed to leverage
       this flaw.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0888 to this issue.
    
     d. Security update for krb5
    
       KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable
       for some krb4 message types, which allows remote attackers to
       cause a denial of service (crash) and possibly execute arbitrary
       code via crafted messages that trigger a NULL pointer dereference
       or double-free.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0062 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not
       properly clear the unused portion of a buffer when generating an
       error message, which might allow remote attackers to obtain
       sensitive information, aka 'Uninitialized stack values.'
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0063 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used
       by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably
       other versions before 1.3, when running on systems whose unistd.h
       does not define the FD_SETSIZE macro, allows remote attackers to cause
       a denial of service (crash) and possibly execute arbitrary code by
       triggering a large number of open file descriptors.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0948 to this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.vmware.com/pipermail/security-announce/2008/000022.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply the missing patches.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 119, 189, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:3.5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/27");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
      script_family(english:"VMware ESX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/VMware/release", "Host/VMware/version");
      script_require_ports("Host/VMware/esxupdate", "Host/VMware/esxcli_software_vibs");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("vmware_esx_packages.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/VMware/release")) audit(AUDIT_OS_NOT, "VMware ESX / ESXi");
    if (
      !get_kb_item("Host/VMware/esxcli_software_vibs") &&
      !get_kb_item("Host/VMware/esxupdate")
    ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    init_esx_check(date:"2008-06-04");
    flag = 0;
    
    
    if (esx_check(ver:"ESX 2.5.4", patch:"19")) flag++;
    
    if (esx_check(ver:"ESX 2.5.5", patch:"8")) flag++;
    
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004186")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004189")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004190")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004721")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004723")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004725")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004728")) flag++;
    
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004216")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004219")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004719")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004722")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004724")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004726")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004727")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004821")) flag++;
    
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805504-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805505-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805506-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805507-SG",
        patch_updates : make_list("ESX350-201006408-SG", "ESX350-201008411-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805508-SG",
        patch_updates : make_list("ESX350-200911210-UG", "ESX350-200912406-BG", "ESX350-201006409-BG", "ESX350-201105403-BG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805515-SG",
        patch_updates : make_list("ESX350-200911201-UG", "ESX350-201006401-SG", "ESX350-201203401-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805501-I-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805502-T-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805503-C-SG")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201209-25.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201209-25 (VMware Player, Server, Workstation: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in VMware Player, Server, and Workstation. Please review the CVE identifiers referenced below for details. Impact : Local users may be able to gain escalated privileges, cause a Denial of Service, or gain sensitive information. A remote attacker could entice a user to open a specially crafted file, possibly resulting in the remote execution of arbitrary code, or a Denial of Service. Remote attackers also may be able to spoof DNS traffic, read arbitrary files, or inject arbitrary web script to the VMware Server Console. Furthermore, guest OS users may be able to execute arbitrary code on the host OS, gain escalated privileges on the guest OS, or cause a Denial of Service (crash the host OS). Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id62383
    published2012-10-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62383
    titleGLSA-201209-25 : VMware Player, Server, Workstation: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201209-25.
    #
    # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(62383);
      script_version("1.24");
      script_cvs_date("Date: 2019/11/12");
    
      script_cve_id("CVE-2007-5269", "CVE-2007-5503", "CVE-2007-5671", "CVE-2008-0967", "CVE-2008-1340", "CVE-2008-1361", "CVE-2008-1362", "CVE-2008-1363", "CVE-2008-1364", "CVE-2008-1392", "CVE-2008-1447", "CVE-2008-1806", "CVE-2008-1807", "CVE-2008-1808", "CVE-2008-2098", "CVE-2008-2100", "CVE-2008-2101", "CVE-2008-4915", "CVE-2008-4916", "CVE-2008-4917", "CVE-2009-0040", "CVE-2009-0909", "CVE-2009-0910", "CVE-2009-1244", "CVE-2009-2267", "CVE-2009-3707", "CVE-2009-3732", "CVE-2009-3733", "CVE-2009-4811", "CVE-2010-1137", "CVE-2010-1138", "CVE-2010-1139", "CVE-2010-1140", "CVE-2010-1141", "CVE-2010-1142", "CVE-2010-1143", "CVE-2011-3868");
      script_bugtraq_id(25956, 26650, 28276, 28289, 29444, 29552, 29557, 29637, 29639, 29640, 29641, 30131, 30937, 32168, 32597, 33827, 33990, 34373, 34471, 36630, 36841, 36842, 39104, 39392, 39394, 39395, 39396, 39397, 39407, 39949, 49942);
      script_xref(name:"GLSA", value:"201209-25");
      script_xref(name:"IAVA", value:"2008-A-0045");
    
      script_name(english:"GLSA-201209-25 : VMware Player, Server, Workstation: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201209-25
    (VMware Player, Server, Workstation: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in VMware Player, Server,
          and Workstation. Please review the CVE identifiers referenced below for
          details.
      
    Impact :
    
        Local users may be able to gain escalated privileges, cause a Denial of
          Service, or gain sensitive information.
        A remote attacker could entice a user to open a specially crafted file,
          possibly resulting in the remote execution of arbitrary code, or a Denial
          of Service. Remote attackers also may be able to spoof DNS traffic, read
          arbitrary files, or inject arbitrary web script to the VMware Server
          Console.
        Furthermore, guest OS users may be able to execute arbitrary code on the
          host OS, gain escalated privileges on the guest OS, or cause a Denial of
          Service (crash the host OS).
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201209-25"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Gentoo discontinued support for VMware Player. We recommend that users
          unmerge VMware Player:
          # emerge --unmerge 'app-emulation/vmware-player'
        NOTE: Users could upgrade to
          &ldquo;>=app-emulation/vmware-player-3.1.5&rdquo;, however these packages are
          not currently stable.
        Gentoo discontinued support for VMware Workstation. We recommend that
          users unmerge VMware Workstation:
          # emerge --unmerge 'app-emulation/vmware-workstation'
        NOTE: Users could upgrade to
          &ldquo;>=app-emulation/vmware-workstation-7.1.5&rdquo;, however these packages
          are not currently stable.
        Gentoo discontinued support for VMware Server. We recommend that users
          unmerge VMware Server:
          # emerge --unmerge 'app-emulation/vmware-server'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploithub_sku", value:"EH-14-757");
      script_set_attribute(attribute:"exploit_framework_exploithub", value:"true");
      script_set_attribute(attribute:"d2_elliot_name", value:"Vmware Server File Disclosure");
      script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
      script_cwe_id(16, 20, 22, 94, 119, 134, 189, 200, 264, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vmware-player");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vmware-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vmware-workstation");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/10/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/09/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/10/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"app-emulation/vmware-server", unaffected:make_list(), vulnerable:make_list("le 1.0.9.156507"))) flag++;
    if (qpkg_check(package:"app-emulation/vmware-workstation", unaffected:make_list(), vulnerable:make_list("le 6.5.5.328052"))) flag++;
    if (qpkg_check(package:"app-emulation/vmware-player", unaffected:make_list(), vulnerable:make_list("le 2.5.5.328052"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "VMware Player / Server / Workstation");
    }
    
  • NASL familyWindows
    NASL idVMWARE_MULTIPLE_VMSA_2008_0009.NASL
    descriptionA VMware product installed on the remote host is affected by multiple vulnerabilities. - A local privilege escalation issue in
    last seen2020-06-01
    modified2020-06-02
    plugin id33105
    published2008-06-09
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33105
    titleVMware Products Multiple Vulnerabilities (VMSA-2008-0009)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33105);
      script_version("1.19");
     script_cvs_date("Date: 2018/11/15 20:50:29");
    
      script_cve_id("CVE-2007-5671", "CVE-2008-2100");
      script_bugtraq_id(29552, 29549);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMware Products Multiple Vulnerabilities (VMSA-2008-0009)");
      script_summary(english:"Checks vulnerable versions of multiple VMware products");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host has an application that is affected by
    multiple issues.");
     script_set_attribute(attribute:"description", value:
    "A VMware product installed on the remote host is affected by multiple
    vulnerabilities.
    
      - A local privilege escalation issue in 'HGFS.sys' driver
        included with the VMware Tools package, could allow an
        unprivileged guest user to execute arbitrary code on the
        guest system. It should be noted that installing the new
        releases of the affected product will not resolve the
        issue. In order to successfully apply this patch VMware
        Tools package should be updated on each Windows based
        guest followed by a reboot of the guest system.
        (CVE-2007-5671)
    
      - Multiple buffer overflow vulnerabilities in VMware VIX
        API, which is disabled by default, could allow arbitrary
        code execution on the host system from the guest
        operating system. (CVE-2008-2100)");
      # http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=712
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?58ed8a38");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2008-0009.html" );
      script_set_attribute(attribute:"solution", value:
    "Upgrade to :
    
      - VMware Workstation 6.0.4/5.5.7 or higher.
      - VMware Player 2.0.4/1.0.6 or higher.
      - VMware Server 1.0.6 or higher.
      - VMware ACE 2.0.4 or higher.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 119);
    
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/09");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:ace");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_player");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_server");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:vmware:vmware_workstation");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
    
      script_dependencies("vmware_workstation_detect.nasl","vmware_server_win_detect.nasl", "vmware_player_detect.nasl","vmware_ace_detect.nasl");
      script_require_ports("VMware/Server/Version", "VMware/ACE/Version", "VMware/Player/Version", "VMware/Workstation/Version", 139, 445);
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("smb_func.inc");
    
    port = kb_smb_transport();
    
    # Check for VMware Workstation
    
    version = get_kb_item("VMware/Workstation/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
    
     if (( int(v[0]) < 5 ) ||
         ( int(v[0]) == 5 && int(v[1]) < 5 ) ||
         ( int(v[0]) == 5 && int(v[1]) == 5 && int(v[2]) < 7 ) ||
         ( int(v[0]) == 6 && int(v[1]) == 0 && int(v[2]) < 4 )
       )
         {
          if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",version," of VMware Workstation is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
       	 security_hole(port);
         }
    }
    
    # Check for VMware Server
    
    version = get_kb_item("VMware/Server/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
     if ( ( int(v[0]) < 1 ) ||
          ( int(v[0]) == 1  && int(v[1]) == 0 && int(v[2]) < 6 )
        )
       {
         if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",version," of VMware Server is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
        	security_hole(port);
        }
    }
    
    # Check for VMware Player
    
    version = get_kb_item("VMware/Player/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
     if ( ( int(v[0]) < 1 ) ||
          ( int(v[0]) == 1  && int(v[1]) == 0 && int(v[2]) < 6 ) ||
          ( int(v[0]) == 2  && int(v[1]) == 0 && int(v[2]) < 4 )
        )
       {
         if (report_verbosity)
          {
            report = string(
              "\n",
              "Version ",version," of VMware Player is installed on the remote host.",
              "\n"
            );
            security_hole(port:port, extra:report);
           }
           else
            security_hole(port);
        }
    }
    
    # Check for VMware ACE.
    version = get_kb_item("VMware/ACE/Version");
    if (version)
    {
     v = split(version, sep:".", keep:FALSE);
     if (( int(v[0]) == 2  && int(v[1]) == 0 && int(v[2]) < 4 ))
      {
        if (report_verbosity)
        {
          report = string(
             "\n",
             "Version ",version," of VMware ACE is installed on the remote host.",
             "\n"
          );
          security_hole(port:port, extra:report);
        }
        else
           security_hole(port);
      }
    }
    

Oval

  • accepted2010-05-17T04:00:02.285-04:00
    classvulnerability
    contributors
    • nameMichael Wood
      organizationHewlett-Packard
    • nameJ. Daniel Brown
      organizationDTCC
    definition_extensions
    • commentVMWare ESX Server 3.0.2 is installed
      ovaloval:org.mitre.oval:def:5613
    • commentVMWare ESX Server 3.0.1 is installed
      ovaloval:org.mitre.oval:def:5367
    descriptionMultiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.
    familyunix
    idoval:org.mitre.oval:def:5081
    statusaccepted
    submitted2008-06-10T15:10:44.000-05:00
    titleVMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code
    version5
  • accepted2010-05-17T04:00:05.259-04:00
    classvulnerability
    contributors
    • nameMichael Wood
      organizationHewlett-Packard
    • nameJ. Daniel Brown
      organizationDTCC
    definition_extensions
    • commentVMWare ESX Server 3.0.2 is installed
      ovaloval:org.mitre.oval:def:5613
    • commentVMWare ESX Server 3.0.1 is installed
      ovaloval:org.mitre.oval:def:5367
    descriptionMultiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.
    familyunix
    idoval:org.mitre.oval:def:5647
    statusaccepted
    submitted2008-06-10T15:10:44.000-05:00
    titleVMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code
    version7