Lucene search

K
openvasThis script is Copyright (C) 2012 Greenbone Networks GmbHOPENVAS:103456
HistoryMar 16, 2012 - 12:00 a.m.

VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues

2012-03-1600:00:00
This script is Copyright (C) 2012 Greenbone Networks GmbH
plugins.openvas.org
8

0.114 Low

EPSS

Percentile

94.7%

The remote ESXi is missing one or more security related Updates from VMSA-2010-0018.

Summary

VMware hosted products and ESX patches resolve multiple security issues.

Relevant releases

VMware Workstation 7.1.1 and earlier,
VMware Workstation 6.5.4 and earlier,
VMware Player 3.1.1 and earlier,
VMware Player 2.5.4 and earlier,
VMware Fusion 3.1.1 and earlier,
ESXi 4.1 without patch ESXi410-201010402-BG or later
ESXi 4.0 without patch ESXi400-201009402-BG or later
ESXi 3.5 without patch ESXe350-201008402-T-BG or later
ESX 4.1 without patch ESX410-201010405-BG
ESX 4.0 without patch ESX400-201009401-SG
ESX 3.5 without patch ESX350-201008409-BG

Problem Description

a. VMware Workstation, Player and Fusion vmware-mount race condition

The way temporary files are handled by the mounting process could result in a race condition. This
issue could allow a local user on the host to elevate their privileges.
VMware Workstation and Player running on Microsoft Windows are not affected.

b. VMware Workstation, Player and Fusion vmware-mount privilege escalation vmware-mount which is a suid
binary has a flaw in the way libraries are loaded. This issue could allow local users on the host to
execute arbitrary shared object files with root privileges.

VMware Workstation and Player running on Microsoft Windows are not affected.

c. OS Command Injection in VMware Tools update

A vulnerability in the input validation of VMware Tools update allows for injection of commands. The issue
could allow a user on the host to execute commands on the guest operating system with root privileges.

The issue can only be exploited if VMware Tools is not fully up-to-date. Windows-based virtual machines are not
affected.

d. VMware VMnc Codec frame decompression remote code execution

The VMware movie decoder contains the VMnc media codec that is required to play back movies recorded with VMware
Workstation, VMware Player and VMware ACE, in any compatible media player. The movie decoder is installed as part
of VMware Workstation, VMware Player and VMware ACE, or can be downloaded as a stand alone package.

A function in the decoder frame decompression routine implicitly trusts a size value. An attacker can utilize this
to miscalculate a destination pointer, leading to the corruption of a heap buffer, and could allow for execution of
arbitrary code with the privileges of the user running an application utilizing the vulnerable codec.

For an attack to be successful the user must be tricked into visiting a malicious web page or opening a malicious video
file on a system that has the vulnerable version of the VMnc codec installed.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_VMSA-2010-0018.nasl 7583 2017-10-26 12:07:01Z cfischer $
#
# VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues
#
# Authors:
# Michael Meyer <[email protected]>
#
# Copyright:
# Copyright (c) 2012 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_summary = "The remote ESXi is missing one or more security related Updates from VMSA-2010-0018.

Summary

VMware hosted products and ESX patches resolve multiple security issues.

Relevant releases

VMware Workstation 7.1.1 and earlier,
VMware Workstation 6.5.4 and earlier,
VMware Player 3.1.1 and earlier,
VMware Player 2.5.4 and earlier,
VMware Fusion 3.1.1 and earlier,
ESXi 4.1 without patch ESXi410-201010402-BG or later
ESXi 4.0 without patch ESXi400-201009402-BG or later
ESXi 3.5 without patch ESXe350-201008402-T-BG or later
ESX 4.1 without patch ESX410-201010405-BG
ESX 4.0 without patch ESX400-201009401-SG
ESX 3.5 without patch ESX350-201008409-BG

Problem Description

a. VMware Workstation, Player and Fusion vmware-mount race condition

   The way temporary files are handled by the mounting process could result in a race condition. This
   issue could allow a local user on the host to elevate their privileges.
   VMware Workstation and Player running on Microsoft Windows are not affected.

b. VMware Workstation, Player and Fusion vmware-mount privilege escalation vmware-mount which is a suid
   binary has a flaw in the way libraries are loaded.  This issue could allow local users on the host to
   execute arbitrary shared object files with root privileges.

   VMware Workstation and Player running on Microsoft Windows are not affected.

  
c. OS Command Injection in VMware Tools update
      
   A vulnerability in the input validation of VMware Tools update allows for injection of commands. The issue
   could allow a user on the host to execute commands on the guest operating system with root privileges.

   The issue can only be exploited if VMware Tools is not fully up-to-date.  Windows-based virtual machines are not
   affected.

d. VMware VMnc Codec frame decompression remote code execution

   The VMware movie decoder contains the VMnc media codec that is required to play back movies recorded with VMware
   Workstation, VMware Player and VMware ACE, in any compatible media player. The movie decoder is installed as part
   of VMware Workstation, VMware Player and VMware ACE, or can be downloaded as a stand alone package.

   A function in the decoder frame decompression routine implicitly trusts a size value.  An attacker can utilize this
   to miscalculate a destination pointer, leading to the corruption of a heap buffer, and could allow for execution of
   arbitrary code with the privileges of the user running an application utilizing the vulnerable codec.

   For an attack to be successful the user must be tricked into visiting a malicious web page or opening a malicious video
   file on a system that has the vulnerable version of the VMnc codec installed.";

tag_solution = "Apply the missing patch(es).";

if (description)
{
 script_id(103456);
 script_cve_id("CVE-2010-4295", "CVE-2010-4296", "CVE-2010-4297", "CVE-2010-4294");
 script_tag(name:"cvss_base", value:"9.3");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_version ("$Revision: 7583 $");
 script_name("VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues");


 script_tag(name:"last_modification", value:"$Date: 2017-10-26 14:07:01 +0200 (Thu, 26 Oct 2017) $");
 script_tag(name:"creation_date", value:"2012-03-16 12:42:13 +0100 (Fri, 16 Mar 2012)");
 script_category(ACT_GATHER_INFO);
 script_family("VMware Local Security Checks");
 script_copyright("This script is Copyright (C) 2012 Greenbone Networks GmbH");
 script_dependencies("gb_vmware_esxi_init.nasl");
 script_mandatory_keys("VMware/ESXi/LSC","VMware/ESX/version");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name:"qod_type", value:"package");
 script_tag(name:"solution_type", value:"VendorFix");
 script_xref(name : "URL" , value : "http://www.vmware.com/security/advisories/VMSA-2010-0018.html");
 exit(0);
}

include("version_func.inc"); # Used in _esxi_patch_missing()
include("vmware_esx.inc");

if(!get_kb_item('VMware/ESXi/LSC'))exit(0);
if(! esxVersion = get_kb_item("VMware/ESX/version"))exit(0);

patches = make_array("4.1.0","ESXi410-201010402-BG",
                     "4.0.0","ESXi400-201009402-BG");

if(!patches[esxVersion])exit(0);

if(_esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {

  security_message(port:0);
  exit(0);

}

exit(99);