Vulnerabilities > CVE-2012-2752 - Unspecified vulnerability in VMWare VMA 4.0/4.1/5.0.0.1

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
vmware
nessus

Summary

Untrusted search path vulnerability in VMware vMA 4.x and 5.x before 5.0.0.2 allows local users to gain privileges via a Trojan horse DLL in the current working directory. Per: http://cwe.mitre.org/data/lists/426.html 'Untrusted Search Path'

Vulnerable Configurations

Part Description Count
Application
Vmware
3

Nessus

NASL familySuSE Local Security Checks
NASL idVMWARE_VMA_VMSA_2012_0010.NASL
descriptionThe version of VMware vMA installed on the remote SuSE Linux Enterprise Server host is 4.x or 5.x earlier than 5.0.0.2. As such, it is potentially affected by a local privilege escalation vulnerability due to the way library files are loaded.
last seen2020-06-01
modified2020-06-02
plugin id59372
published2012-06-05
reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/59372
titleVMware vMA Unspecified Library Local Privilege Escalation (VMSA-2012-0010)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(59372);
  script_version("1.4");
  script_cvs_date("Date: 2018/08/06 14:03:15");

  script_cve_id("CVE-2012-2752");
  script_bugtraq_id(53697);
  script_xref(name:"VMSA", value:"2012-0010");

  script_name(english:"VMware vMA Unspecified Library Local Privilege Escalation (VMSA-2012-0010)");
  script_summary(english:"Checks version of vmareleaseinfo package");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an application installed that is affected by a
local privilege escalation vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of VMware vMA installed on the remote SuSE Linux
Enterprise Server host is 4.x or 5.x earlier than 5.0.0.2.  As such,
it is potentially affected by a local privilege escalation
vulnerability due to the way library files are loaded.");
  script_set_attribute(attribute:"see_also", value:"http://www.vmware.com/security/advisories/VMSA-2012-0010.html");
  script_set_attribute(attribute:"see_also", value:"http://lists.vmware.com/pipermail/security-announce/2012/000177.html");
  script_set_attribute(attribute:"solution", value:"Update to vMA 5.0 Patch 2 (5.0.0.2) or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/05/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/05");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:vma");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"SuSE Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list");

  exit(0);
}

include('global_settings.inc');
include('rpm.inc');
include('audit.inc');

if (!get_kb_item('Host/local_checks_enabled')) exit(0, 'Local checks are not enabled.');
if (!get_kb_item('Host/SuSE/release')) exit(0, 'The host is not running SuSE.');
list = get_kb_item('Host/SuSE/rpm-list');
if (isnull(list)) exit(1, 'Could not obtain the list of installed packages.');

my_rpm = parse_rpm_name(rpm:'vmareleaseinfo-5.0.0.2-1');
packages = egrep(pattern:'^vmareleaseinfo-[0-9]', string:list);
if (!packages) audit(AUDIT_NOT_INST, 'VMware vMA');

vuln = 0;
foreach package (split(packages, sep:'\n', keep:FALSE))
{
  item = parse_rpm_name(rpm:package);

  ver = split(item['version'], sep:'.');
  for (i=0; i < max_index(ver); i++)
    ver[i] = int(ver[i]);

  # nb: VMSA-2012-0010 lists vMA 4.x and 5.x as affected.
  if (
    ver[0] == 4 ||
    (ver[0] == 5 && ver[1] == 0 && ver[2] == 0 && ver[3] < 2)
  )
  {
    vuln++;
    rpm_report_add(package:package, reference:'vmareleaseinfo-5.0.0.2-1');
  }
}

if (vuln)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
audit(AUDIT_INST_VER_NOT_VULN, 'VMware vMA');

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 53697 CVE ID: CVE-2012-2752 vSphere Management Assistant (vMA)是允许管理员和开发者运行脚本和代理以管理ESXi主机和vCenter服务器系统的虚拟计算机。 VMWare vMA 4.0、4.1、5.0.0.1 之前版本在实现上存在加载任意文件导致的本地权限提升漏洞,攻击者可利用此漏洞以提升的权限执行任意代码。 0 VMWare vMA 5.0.0.1 VMWare vMA 4.1 VMWare vMA 4.0 厂商补丁: VMWare ------ VMWare已经为此发布了一个安全公告(VMSA-2012-0010)以及相应补丁: VMSA-2012-0010:VMware vMA addresses a security issue 链接:http://www.vmware.com/security/advisories/VMSA-2012-0010.html
idSSV:60165
last seen2017-11-19
modified2012-05-29
published2012-05-29
reporterRoot
titleVMware vMA不明细节本地权限提升漏洞