Lucene search

K
msvrMicrosoft Vulnerability ResearchMSVR13-003
HistoryFeb 19, 2013 - 12:00 a.m.

Vulnerability in VMware VMCI.sys Could Allow Local Elevation of Privilege

2013-02-1900:00:00
Microsoft Vulnerability Research
technet.microsoft.com
613

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

Executive Summary

Microsoft is providing notification of the discovery and remediation of a vulnerability affecting VMware Workstation version 8.0.4 and earlier versions. Microsoft discovered and disclosed the vulnerability under coordinated vulnerability disclosure to the affected vendor, VMware. VMware has remediated the vulnerability in their software.

A vulnerability exists in the way that the VMware VMCI.sys driver handles particular IO codes. An attacker who successfully exploited this vulnerability could gain elevated privileges on the affected system and run commands in the security context of the Local System. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

Microsoft Vulnerability Research reported this issue to and coordinated with VMware to ensure remediation of this issue. The vulnerability has been assigned the entry, CVE-2013-1406, in the Common Vulnerabilities and Exposures list. For more information, including information about updates from VMware, see VMware security advisory VMSA-2013-0002.1.

Mitigating Factors

  • An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
  • This vulnerability cannot be exploited automatically through email or through a website.

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C