Lucene search

K
debianDebianDEBIAN:DLA-3646-1:29494
HistoryNov 05, 2023 - 10:18 p.m.

[SECURITY] [DLA 3646-1] open-vm-tools security update

2023-11-0522:18:02
lists.debian.org
7
cve-2023-34058
open-vm-tools
guest operation privileges
file descriptor hijack
cve-2023-34059
debian 10 buster
security update
saml token signature bypass

7.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.9%


Debian LTS Advisory DLA-3646-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
November 05, 2023 https://wiki.debian.org/LTS


Package : open-vm-tools
Version : 2:10.3.10-1+deb10u6
CVE ID : CVE-2023-34058 CVE-2023-34059
Debian Bug : 1054666

Brief introduction

CVE-2023-34058

A file descriptor hijack vulnerability was found in
the vmware-user-suid-wrapper command.
A malicious actor with non-root privileges might have been able
to hijack the /dev/uinput file descriptor allowing
them to simulate user inputs.

CVE-2023-34059

A SAML Token Signature Bypass vulnerability was found.
A malicious actor that has been granted Guest Operation Privileges
in a target virtual machine might have been able to
elevate their privileges if that target
virtual machine has been assigned a more privileged Guest Alias.

For Debian 10 buster, these problems have been fixed in version
2:10.3.10-1+deb10u6.

We recommend that you upgrade your open-vm-tools packages.

For the detailed security status of open-vm-tools please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/open-vm-tools

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

7.5 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.9%