Vulnerabilities > CVE-2012-5459 - Unspecified vulnerability in VMWare Player and Workstation
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN vmware
nessus
Summary
Untrusted search path vulnerability in VMware Workstation 8.x before 8.0.5 and VMware Player 4.x before 4.0.5 on Windows allows host OS users to gain host OS privileges via a Trojan horse DLL in a "system folder."
Vulnerable Configurations
Nessus
NASL family Windows NASL id VMWARE_WORKSTATION_MULTIPLE_VMSA_2012_0015.NASL description The VMware Workstation 8.x install detected on the remote host is earlier than 8.0.5 and is, therefore, potentially affected by the following vulnerabilities : - Certain processes, when created, have weak security permissions assigned. It is possible to commandeer these process threads, which could result in elevation of privileges in the context of the host. (CVE-2012-5458) - A DLL binary planning vulnerability exists that could be exploited by an attacker to execute arbitrary code on the remote host. (CVE-2012-5459) last seen 2020-06-01 modified 2020-06-02 plugin id 63077 published 2012-11-28 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/63077 title VMware Workstation 8.x < 8.0.5 Multiple Vulnerabilities (VMSA-2012-0015) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(63077); script_version("1.6"); script_cvs_date("Date: 2018/11/15 20:50:29"); script_cve_id("CVE-2012-5458", "CVE-2012-5459"); script_bugtraq_id(56469, 56470); script_xref(name:"VMSA", value:"2012-0015"); script_name(english:"VMware Workstation 8.x < 8.0.5 Multiple Vulnerabilities (VMSA-2012-0015)"); script_summary(english:"Checks VMware Workstation version"); script_set_attribute( attribute:"synopsis", value: "The remote host has a virtualization application that is affected by multiple vulnerabilities." ); script_set_attribute( attribute:"description", value: "The VMware Workstation 8.x install detected on the remote host is earlier than 8.0.5 and is, therefore, potentially affected by the following vulnerabilities : - Certain processes, when created, have weak security permissions assigned. It is possible to commandeer these process threads, which could result in elevation of privileges in the context of the host. (CVE-2012-5458) - A DLL binary planning vulnerability exists that could be exploited by an attacker to execute arbitrary code on the remote host. (CVE-2012-5459)"); script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2012-0015.html"); script_set_attribute(attribute:"see_also", value:"http://lists.vmware.com/pipermail/security-announce/2012/000193.html"); script_set_attribute(attribute:"solution", value:"Upgrade to VMware Workstation 8.0.5 or later."); script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/08"); script_set_attribute(attribute:"patch_publication_date", value:"2012/11/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/11/28"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:workstation"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); script_dependencies("vmware_workstation_detect.nasl"); script_require_keys("SMB/Registry/Enumerated", "VMware/Workstation/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("smb_func.inc"); version = get_kb_item_or_exit("VMware/Workstation/Version"); path = get_kb_item_or_exit("VMware/Workstation/Path"); if (version !~ '^8\\.0') exit(0, "The VMware Workstation install under "+path+" is "+version+", not 8.x."); fixed_version = '8.0.5'; if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0) { port = kb_smb_transport(); if (report_verbosity > 0) { report += '\n Path : ' + path + '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version + '\n'; security_hole(port:port, extra:report); } else security_hole(port); } else audit(AUDIT_INST_PATH_NOT_VULN, "VMware Workstation", version, path);
NASL family Windows NASL id VMWARE_PLAYER_MULTIPLE_VMSA_2012_0015.NASL description The VMware Player 4.x install detected on the remote host is earlier than 4.0.5 and is, therefore, potentially affected by the following vulnerabilities : - Certain processes, when created, have weak security permissions assigned. It is possible to commandeer these process threads, which could result in elevation of privileges in the context of the host. (CVE-2012-5458) - A DLL binary planning vulnerability exists that could be exploited by an attacker to execute arbitrary code on the remote host. (CVE-2012-5459) last seen 2020-06-01 modified 2020-06-02 plugin id 63076 published 2012-11-28 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/63076 title VMware Player 4.x < 4.0.5 Multiple Vulnerabilities (VMSA-2012-0015)
References
- http://osvdb.org/87119
- http://osvdb.org/87119
- http://www.securityfocus.com/bid/56470
- http://www.securityfocus.com/bid/56470
- http://www.vmware.com/security/advisories/VMSA-2012-0015.html
- http://www.vmware.com/security/advisories/VMSA-2012-0015.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79923