VMware Open Virtual Machine Tools File Corruption Vulnerability
2011-04-13T00:00:00
ID OPENVAS:1361412562310801917 Type openvas Reporter Copyright (c) 2011 Greenbone Networks GmbH Modified 2018-10-20T00:00:00
Description
This host is installed with VMware Open Virtual Machine Tools
and is prone to file corruption vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 11997 2018-10-20 11:59:41Z mmartin $
#
# VMware Open Virtual Machine Tools File Corruption Vulnerability
#
# Authors:
# Antu Sanadi <santu@secpod.com>
#
# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.801917");
script_version("$Revision: 11997 $");
script_tag(name:"last_modification", value:"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $");
script_tag(name:"creation_date", value:"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)");
script_cve_id("CVE-2011-1681");
script_tag(name:"cvss_base", value:"3.3");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:P/I:P/A:N");
script_name("VMware Open Virtual Machine Tools File Corruption Vulnerability");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2011/03/31/4");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2011/03/22/6");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2011/03/05/7");
script_xref(name:"URL", value:"http://openwall.com/lists/oss-security/2011/03/04/10");
script_tag(name:"qod_type", value:"executable_version");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_vmware_ovm_tools_detect_lin.nasl");
script_mandatory_keys("VMware/OVM/Tools/Ver");
script_tag(name:"impact", value:"Successful exploitation will allows local users to trigger
corruption of this file via a process with a small RLIMIT_FSIZE value.");
script_tag(name:"affected", value:"VMware Open Virtual Machine Tools version 8.4.2-261024 and
prior.");
script_tag(name:"insight", value:"The flaw is due to an error in 'vmware-hgfsmounter', which
attempts to append to the '/etc/mtab' file without first checking whether
resource limits would interfere.");
script_tag(name:"solution", value:"Upgrade to version 2011.05.27 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"summary", value:"This host is installed with VMware Open Virtual Machine Tools
and is prone to file corruption vulnerability.");
script_xref(name:"URL", value:"http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools");
exit(0);
}
include("version_func.inc");
vmVer = get_kb_item("VMware/OVM/Tools/Ver");
if(!vmVer){
exit(0);
}
## match the version without build
version = eregmatch(pattern:"([0-9]+\.[0-9]+\.[0-9]+)", string:vmVer);
if(version[1])
{
buildVer = eregmatch(pattern:"build ([0-9]+)", string:vmVer);
if(buildVer[1]){
ver = version[1] +"." + buildVer[1];
}
else {
ver = version[1];
}
if(version_is_less_equal(version:ver, test_version:"8.4.2.261024")){
security_message( port: 0, data: "The target host was found to be vulnerable" );
}
}
{"id": "OPENVAS:1361412562310801917", "bulletinFamily": "scanner", "title": "VMware Open Virtual Machine Tools File Corruption Vulnerability", "description": "This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.", "published": "2011-04-13T00:00:00", "modified": "2018-10-20T00:00:00", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801917", "reporter": "Copyright (c) 2011 Greenbone Networks GmbH", "references": ["http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools", "http://openwall.com/lists/oss-security/2011/03/05/7", "http://openwall.com/lists/oss-security/2011/03/31/4", "http://openwall.com/lists/oss-security/2011/03/22/6", "http://openwall.com/lists/oss-security/2011/03/04/10"], "cvelist": ["CVE-2011-1681"], "type": "openvas", "lastseen": "2019-05-29T18:39:38", "history": [{"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2011-1681"], "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "description": "This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.", "edition": 4, "enchantments": {"dependencies": {"modified": "2018-10-22T16:44:35", "references": [{"idList": ["OPENVAS:801917"], "type": "openvas"}, {"idList": ["CVE-2011-1681"], "type": "cve"}, {"idList": ["SUSE_11_3_LIBVMTOOLS-DEVEL-110607.NASL", "SUSE_11_4_LIBVMTOOLS-DEVEL-110608.NASL"], "type": "nessus"}]}, "score": {"value": 7.2, "vector": "NONE"}}, "hash": "fb0a54dafee9553a33bd3ca37d2dac7764f327d34b4d74c7ef47043814fc549e", "hashmap": [{"hash": "15bc6dc844e4b9ecee34f343b0fae75b", "key": "published"}, {"hash": "bac1f44f73bc6155024f3aee012a6d0e", "key": "href"}, {"hash": "7bed8b4734b9cd4ec986ce3c394fa382", "key": "sourceData"}, {"hash": "fdc029205724db5785fbed09720ce88c", "key": "cvelist"}, {"hash": "5b3e78bf2118fdcf240d0771f3c6039e", "key": "reporter"}, {"hash": "ec20d7aa293846c0073afd68179f596a", "key": "title"}, {"hash": "0db377921f4ce762c62526131097968f", "key": "naslFamily"}, {"hash": "fede443593ce19d7242a05017a1ded7e", "key": "references"}, {"hash": "dff0d156ab718098a518e91117d18b93", "key": "cvss"}, {"hash": "a73bf084938cf49498a14daf277d0c9f", "key": "description"}, {"hash": "6c6a5cef9becd6558f94bc89dc6801d6", "key": "pluginID"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "2c104a45bc8ee43625332611b190dc40", "key": "modified"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801917", "id": "OPENVAS:1361412562310801917", "lastseen": "2018-10-22T16:44:35", "modified": "2018-10-20T00:00:00", "naslFamily": "General", "objectVersion": "1.3", "pluginID": "1361412562310801917", "published": "2011-04-13T00:00:00", "references": ["http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools", "http://openwall.com/lists/oss-security/2011/03/05/7", "http://openwall.com/lists/oss-security/2011/03/31/4", "http://openwall.com/lists/oss-security/2011/03/22/6", "http://openwall.com/lists/oss-security/2011/03/04/10"], "reporter": "Copyright (c) 2011 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 11997 2018-10-20 11:59:41Z mmartin $\n#\n# VMware Open Virtual Machine Tools File Corruption Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801917\");\n script_version(\"$Revision: 11997 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)\");\n script_cve_id(\"CVE-2011-1681\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"VMware Open Virtual Machine Tools File Corruption Vulnerability\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/31/4\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/22/6\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/05/7\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/04/10\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_vmware_ovm_tools_detect_lin.nasl\");\n script_mandatory_keys(\"VMware/OVM/Tools/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allows local users to trigger\ncorruption of this file via a process with a small RLIMIT_FSIZE value.\");\n script_tag(name:\"affected\", value:\"VMware Open Virtual Machine Tools version 8.4.2-261024 and\nprior.\");\n script_tag(name:\"insight\", value:\"The flaw is due to an error in 'vmware-hgfsmounter', which\nattempts to append to the '/etc/mtab' file without first checking whether\nresource limits would interfere.\");\n script_tag(name:\"solution\", value:\"Upgrade to version 2011.05.27 or later.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.\");\n script_xref(name:\"URL\", value:\"http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nvmVer = get_kb_item(\"VMware/OVM/Tools/Ver\");\nif(!vmVer){\n exit(0);\n}\n\n## match the version without build\nversion = eregmatch(pattern:\"([0-9]+\\.[0-9]+\\.[0-9]+)\", string:vmVer);\nif(version[1])\n{\n buildVer = eregmatch(pattern:\"build ([0-9]+)\", string:vmVer);\n if(buildVer[1]){\n ver = version[1] +\".\" + buildVer[1];\n }\n else {\n ver = version[1];\n }\n\n if(version_is_less_equal(version:ver, test_version:\"8.4.2.261024\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "title": "VMware Open Virtual Machine Tools File Corruption Vulnerability", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 4, "lastseen": "2018-10-22T16:44:35"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2011-1681"], "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "description": "This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.", "edition": 1, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}}, "hash": "0b551e5c568ffc88aaf1a417ffa8b64505a67271842b9c47f85cc8e0fe16bd44", "hashmap": [{"hash": "15bc6dc844e4b9ecee34f343b0fae75b", "key": "published"}, {"hash": "bac1f44f73bc6155024f3aee012a6d0e", "key": "href"}, {"hash": "fdc029205724db5785fbed09720ce88c", "key": "cvelist"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "5b3e78bf2118fdcf240d0771f3c6039e", "key": "reporter"}, {"hash": "ec20d7aa293846c0073afd68179f596a", "key": "title"}, {"hash": "0db377921f4ce762c62526131097968f", "key": "naslFamily"}, {"hash": "dff0d156ab718098a518e91117d18b93", "key": "cvss"}, {"hash": "a73bf084938cf49498a14daf277d0c9f", "key": "description"}, {"hash": "6fc07a3ee4aa4a57ac487d00d0b4398d", "key": "references"}, {"hash": "6c6a5cef9becd6558f94bc89dc6801d6", "key": "pluginID"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "94b9f05b5511290cf540ecff6f2cc35c", "key": "sourceData"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801917", "id": "OPENVAS:1361412562310801917", "lastseen": "2018-04-06T11:34:55", "modified": "2018-04-06T00:00:00", "naslFamily": "General", "objectVersion": "1.3", "pluginID": "1361412562310801917", "published": "2011-04-13T00:00:00", "references": ["http://openwall.com/lists/oss-security/2011/03/05/7", "http://openwall.com/lists/oss-security/2011/03/31/4", "http://openwall.com/lists/oss-security/2011/03/22/6", "http://openwall.com/lists/oss-security/2011/03/04/10"], "reporter": "Copyright (c) 2011 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 9351 2018-04-06 07:05:43Z cfischer $\n#\n# VMware Open Virtual Machine Tools File Corruption Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allows local users to trigger\ncorruption of this file via a process with a small RLIMIT_FSIZE value.\";\n\ntag_affected = \"VMware Open Virtual Machine Tools version 8.4.2-261024 and\nprior.\";\n\ntag_insight = \"The flaw is due to an error in 'vmware-hgfsmounter', which\nattempts to append to the '/etc/mtab' file without first checking whether\nresource limits would interfere.\";\n\ntag_solution = \"Upgrade to version 2011.05.27 or later,\nFor updates refer to http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools\";\n\ntag_summary = \"This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801917\");\n script_version(\"$Revision: 9351 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:05:43 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)\");\n script_cve_id(\"CVE-2011-1681\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"VMware Open Virtual Machine Tools File Corruption Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/31/4\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/22/6\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/05/7\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/04/10\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_vmware_ovm_tools_detect_lin.nasl\");\n script_mandatory_keys(\"VMware/OVM/Tools/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Get the version from kb\nvmVer = get_kb_item(\"VMware/OVM/Tools/Ver\");\nif(!vmVer){\n exit(0);\n}\n\n## match the version without build\nversion = eregmatch(pattern:\"([0-9]+\\.[0-9]+\\.[0-9]+)\", string:vmVer);\nif(version[1])\n{\n ## Get the build version\n buildVer = eregmatch(pattern:\"build ([0-9]+)\", string:vmVer);\n if(buildVer[1]){\n ver = version[1] +\".\" + buildVer[1];\n }\n else {\n ver = version[1];\n }\n\n ## Check the version is less or equal to 8.4.2.261024\n if(version_is_less_equal(version:ver, test_version:\"8.4.2.261024\")){\n security_message(0);\n }\n}\n", "title": "VMware Open Virtual Machine Tools File Corruption Vulnerability", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2018-04-06T11:34:55"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2011-1681"], "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "description": "This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.", "edition": 3, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}}, "hash": "0b551e5c568ffc88aaf1a417ffa8b64505a67271842b9c47f85cc8e0fe16bd44", "hashmap": [{"hash": "15bc6dc844e4b9ecee34f343b0fae75b", "key": "published"}, {"hash": "bac1f44f73bc6155024f3aee012a6d0e", "key": "href"}, {"hash": "fdc029205724db5785fbed09720ce88c", "key": "cvelist"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "5b3e78bf2118fdcf240d0771f3c6039e", "key": "reporter"}, {"hash": "ec20d7aa293846c0073afd68179f596a", "key": "title"}, {"hash": "0db377921f4ce762c62526131097968f", "key": "naslFamily"}, {"hash": "dff0d156ab718098a518e91117d18b93", "key": "cvss"}, {"hash": "a73bf084938cf49498a14daf277d0c9f", "key": "description"}, {"hash": "6fc07a3ee4aa4a57ac487d00d0b4398d", "key": "references"}, {"hash": "6c6a5cef9becd6558f94bc89dc6801d6", "key": "pluginID"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "94b9f05b5511290cf540ecff6f2cc35c", "key": "sourceData"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801917", "id": "OPENVAS:1361412562310801917", "lastseen": "2018-09-02T00:03:23", "modified": "2018-04-06T00:00:00", "naslFamily": "General", "objectVersion": "1.3", "pluginID": "1361412562310801917", "published": "2011-04-13T00:00:00", "references": ["http://openwall.com/lists/oss-security/2011/03/05/7", "http://openwall.com/lists/oss-security/2011/03/31/4", "http://openwall.com/lists/oss-security/2011/03/22/6", "http://openwall.com/lists/oss-security/2011/03/04/10"], "reporter": "Copyright (c) 2011 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 9351 2018-04-06 07:05:43Z cfischer $\n#\n# VMware Open Virtual Machine Tools File Corruption Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allows local users to trigger\ncorruption of this file via a process with a small RLIMIT_FSIZE value.\";\n\ntag_affected = \"VMware Open Virtual Machine Tools version 8.4.2-261024 and\nprior.\";\n\ntag_insight = \"The flaw is due to an error in 'vmware-hgfsmounter', which\nattempts to append to the '/etc/mtab' file without first checking whether\nresource limits would interfere.\";\n\ntag_solution = \"Upgrade to version 2011.05.27 or later,\nFor updates refer to http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools\";\n\ntag_summary = \"This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801917\");\n script_version(\"$Revision: 9351 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:05:43 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)\");\n script_cve_id(\"CVE-2011-1681\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"VMware Open Virtual Machine Tools File Corruption Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/31/4\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/22/6\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/05/7\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/04/10\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_vmware_ovm_tools_detect_lin.nasl\");\n script_mandatory_keys(\"VMware/OVM/Tools/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Get the version from kb\nvmVer = get_kb_item(\"VMware/OVM/Tools/Ver\");\nif(!vmVer){\n exit(0);\n}\n\n## match the version without build\nversion = eregmatch(pattern:\"([0-9]+\\.[0-9]+\\.[0-9]+)\", string:vmVer);\nif(version[1])\n{\n ## Get the build version\n buildVer = eregmatch(pattern:\"build ([0-9]+)\", string:vmVer);\n if(buildVer[1]){\n ver = version[1] +\".\" + buildVer[1];\n }\n else {\n ver = version[1];\n }\n\n ## Check the version is less or equal to 8.4.2.261024\n if(version_is_less_equal(version:ver, test_version:\"8.4.2.261024\")){\n security_message(0);\n }\n}\n", "title": "VMware Open Virtual Machine Tools File Corruption Vulnerability", "type": "openvas", "viewCount": 0}, "differentElements": ["references", "modified", "sourceData"], "edition": 3, "lastseen": "2018-09-02T00:03:23"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2011-1681"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.", "edition": 2, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}}, "hash": "122b0be8cc217383dffb73edb1edf814666af8a59e34bcb3a21ab835051fd110", "hashmap": [{"hash": "15bc6dc844e4b9ecee34f343b0fae75b", "key": "published"}, {"hash": "bac1f44f73bc6155024f3aee012a6d0e", "key": "href"}, {"hash": "fdc029205724db5785fbed09720ce88c", "key": "cvelist"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "5b3e78bf2118fdcf240d0771f3c6039e", "key": "reporter"}, {"hash": "ec20d7aa293846c0073afd68179f596a", "key": "title"}, {"hash": "0db377921f4ce762c62526131097968f", "key": "naslFamily"}, {"hash": "a73bf084938cf49498a14daf277d0c9f", "key": "description"}, {"hash": "6fc07a3ee4aa4a57ac487d00d0b4398d", "key": "references"}, {"hash": "6c6a5cef9becd6558f94bc89dc6801d6", "key": "pluginID"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "94b9f05b5511290cf540ecff6f2cc35c", "key": "sourceData"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801917", "id": "OPENVAS:1361412562310801917", "lastseen": "2018-08-30T19:27:23", "modified": "2018-04-06T00:00:00", "naslFamily": "General", "objectVersion": "1.3", "pluginID": "1361412562310801917", "published": "2011-04-13T00:00:00", "references": ["http://openwall.com/lists/oss-security/2011/03/05/7", "http://openwall.com/lists/oss-security/2011/03/31/4", "http://openwall.com/lists/oss-security/2011/03/22/6", "http://openwall.com/lists/oss-security/2011/03/04/10"], "reporter": "Copyright (c) 2011 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 9351 2018-04-06 07:05:43Z cfischer $\n#\n# VMware Open Virtual Machine Tools File Corruption Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allows local users to trigger\ncorruption of this file via a process with a small RLIMIT_FSIZE value.\";\n\ntag_affected = \"VMware Open Virtual Machine Tools version 8.4.2-261024 and\nprior.\";\n\ntag_insight = \"The flaw is due to an error in 'vmware-hgfsmounter', which\nattempts to append to the '/etc/mtab' file without first checking whether\nresource limits would interfere.\";\n\ntag_solution = \"Upgrade to version 2011.05.27 or later,\nFor updates refer to http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools\";\n\ntag_summary = \"This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801917\");\n script_version(\"$Revision: 9351 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:05:43 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)\");\n script_cve_id(\"CVE-2011-1681\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"VMware Open Virtual Machine Tools File Corruption Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/31/4\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/22/6\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/05/7\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/04/10\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_vmware_ovm_tools_detect_lin.nasl\");\n script_mandatory_keys(\"VMware/OVM/Tools/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Get the version from kb\nvmVer = get_kb_item(\"VMware/OVM/Tools/Ver\");\nif(!vmVer){\n exit(0);\n}\n\n## match the version without build\nversion = eregmatch(pattern:\"([0-9]+\\.[0-9]+\\.[0-9]+)\", string:vmVer);\nif(version[1])\n{\n ## Get the build version\n buildVer = eregmatch(pattern:\"build ([0-9]+)\", string:vmVer);\n if(buildVer[1]){\n ver = version[1] +\".\" + buildVer[1];\n }\n else {\n ver = version[1];\n }\n\n ## Check the version is less or equal to 8.4.2.261024\n if(version_is_less_equal(version:ver, test_version:\"8.4.2.261024\")){\n security_message(0);\n }\n}\n", "title": "VMware Open Virtual Machine Tools File Corruption Vulnerability", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T19:27:23"}], "edition": 5, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "fdc029205724db5785fbed09720ce88c"}, {"key": "cvss", "hash": "e51f91d4212a9dd5ad64f3ef1531a793"}, {"key": "description", "hash": "a73bf084938cf49498a14daf277d0c9f"}, {"key": "href", "hash": "bac1f44f73bc6155024f3aee012a6d0e"}, {"key": "modified", "hash": "2c104a45bc8ee43625332611b190dc40"}, {"key": "naslFamily", "hash": "0db377921f4ce762c62526131097968f"}, {"key": "pluginID", "hash": "6c6a5cef9becd6558f94bc89dc6801d6"}, {"key": "published", "hash": "15bc6dc844e4b9ecee34f343b0fae75b"}, {"key": "references", "hash": "fede443593ce19d7242a05017a1ded7e"}, {"key": "reporter", "hash": "5b3e78bf2118fdcf240d0771f3c6039e"}, {"key": "sourceData", "hash": "7bed8b4734b9cd4ec986ce3c394fa382"}, {"key": "title", "hash": "ec20d7aa293846c0073afd68179f596a"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "d006e35aa56ae566846bfd7e3475a4d850926f931a343ebfb42694184b70c1a6", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-1681"]}, {"type": "openvas", "idList": ["OPENVAS:801917"]}, {"type": "nessus", "idList": ["SUSE_11_3_LIBVMTOOLS-DEVEL-110607.NASL", "SUSE_11_4_LIBVMTOOLS-DEVEL-110608.NASL"]}], "modified": "2019-05-29T18:39:38"}, "score": {"value": 4.3, "vector": "NONE", "modified": "2019-05-29T18:39:38"}, "vulnersScore": 4.3}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 11997 2018-10-20 11:59:41Z mmartin $\n#\n# VMware Open Virtual Machine Tools File Corruption Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801917\");\n script_version(\"$Revision: 11997 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)\");\n script_cve_id(\"CVE-2011-1681\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"VMware Open Virtual Machine Tools File Corruption Vulnerability\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/31/4\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/22/6\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/05/7\");\n script_xref(name:\"URL\", value:\"http://openwall.com/lists/oss-security/2011/03/04/10\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_vmware_ovm_tools_detect_lin.nasl\");\n script_mandatory_keys(\"VMware/OVM/Tools/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allows local users to trigger\ncorruption of this file via a process with a small RLIMIT_FSIZE value.\");\n script_tag(name:\"affected\", value:\"VMware Open Virtual Machine Tools version 8.4.2-261024 and\nprior.\");\n script_tag(name:\"insight\", value:\"The flaw is due to an error in 'vmware-hgfsmounter', which\nattempts to append to the '/etc/mtab' file without first checking whether\nresource limits would interfere.\");\n script_tag(name:\"solution\", value:\"Upgrade to version 2011.05.27 or later.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.\");\n script_xref(name:\"URL\", value:\"http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nvmVer = get_kb_item(\"VMware/OVM/Tools/Ver\");\nif(!vmVer){\n exit(0);\n}\n\n## match the version without build\nversion = eregmatch(pattern:\"([0-9]+\\.[0-9]+\\.[0-9]+)\", string:vmVer);\nif(version[1])\n{\n buildVer = eregmatch(pattern:\"build ([0-9]+)\", string:vmVer);\n if(buildVer[1]){\n ver = version[1] +\".\" + buildVer[1];\n }\n else {\n ver = version[1];\n }\n\n if(version_is_less_equal(version:ver, test_version:\"8.4.2.261024\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "naslFamily": "General", "pluginID": "1361412562310801917", "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:11:10", "bulletinFamily": "NVD", "description": "vmware-hgfsmounter in VMware Open Virtual Machine Tools (aka open-vm-tools) 8.4.2-261024 and earlier attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to trigger corruption of this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.", "modified": "2017-08-17T01:34:00", "id": "CVE-2011-1681", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1681", "published": "2011-04-10T02:55:00", "title": "CVE-2011-1681", "type": "cve", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}], "openvas": [{"lastseen": "2017-09-04T14:19:42", "bulletinFamily": "scanner", "description": "This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.", "modified": "2017-08-31T00:00:00", "published": "2011-04-13T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=801917", "id": "OPENVAS:801917", "title": "VMware Open Virtual Machine Tools File Corruption Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_vmware_ovm_tools_file_corruption_vuln.nasl 7029 2017-08-31 11:51:40Z teissa $\n#\n# VMware Open Virtual Machine Tools File Corruption Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allows local users to trigger\ncorruption of this file via a process with a small RLIMIT_FSIZE value.\";\n\ntag_affected = \"VMware Open Virtual Machine Tools version 8.4.2-261024 and\nprior.\";\n\ntag_insight = \"The flaw is due to an error in 'vmware-hgfsmounter', which\nattempts to append to the '/etc/mtab' file without first checking whether\nresource limits would interfere.\";\n\ntag_solution = \"Upgrade to version 2011.05.27 or later,\nFor updates refer to http://sourceforge.net/projects/open-vm-tools/files/open-vm-tools\";\n\ntag_summary = \"This host is installed with VMware Open Virtual Machine Tools\nand is prone to file corruption vulnerability.\";\n\nif(description)\n{\n script_id(801917);\n script_version(\"$Revision: 7029 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-08-31 13:51:40 +0200 (Thu, 31 Aug 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-13 15:50:09 +0200 (Wed, 13 Apr 2011)\");\n script_cve_id(\"CVE-2011-1681\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_name(\"VMware Open Virtual Machine Tools File Corruption Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/31/4\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/22/6\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/05/7\");\n script_xref(name : \"URL\" , value : \"http://openwall.com/lists/oss-security/2011/03/04/10\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_vmware_ovm_tools_detect_lin.nasl\");\n script_mandatory_keys(\"VMware/OVM/Tools/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Get the version from kb\nvmVer = get_kb_item(\"VMware/OVM/Tools/Ver\");\nif(!vmVer){\n exit(0);\n}\n\n## match the version without build\nversion = eregmatch(pattern:\"([0-9]+\\.[0-9]+\\.[0-9]+)\", string:vmVer);\nif(version[1])\n{\n ## Get the build version\n buildVer = eregmatch(pattern:\"build ([0-9]+)\", string:vmVer);\n if(buildVer[1]){\n ver = version[1] +\".\" + buildVer[1];\n }\n else {\n ver = version[1];\n }\n\n ## Check the version is less or equal to 8.4.2.261024\n if(version_is_less_equal(version:ver, test_version:\"8.4.2.261024\")){\n security_message(0);\n }\n}\n", "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2019-11-03T12:17:43", "bulletinFamily": "scanner", "description": "This update of open-vm-tools fixes the following vulnerabilities which\nallowed an attacker to gain root privileges within the guest system :\n\n - CVE-2011-1681\n\n - CVE-2011-2146\n\n - CVE-2011-1787\n\n - CVE-2011-2145", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_4_LIBVMTOOLS-DEVEL-110608.NASL", "href": "https://www.tenable.com/plugins/nessus/75932", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : libvmtools-devel (openSUSE-SU-2011:0617-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libvmtools-devel-4693.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75932);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/10/25 13:36:42\");\n\n script_cve_id(\"CVE-2011-1681\", \"CVE-2011-1787\", \"CVE-2011-2145\", \"CVE-2011-2146\");\n\n script_name(english:\"openSUSE Security Update : libvmtools-devel (openSUSE-SU-2011:0617-1)\");\n script_summary(english:\"Check for the libvmtools-devel-4693 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of open-vm-tools fixes the following vulnerabilities which\nallowed an attacker to gain root privileges within the guest system :\n\n - CVE-2011-1681\n\n - CVE-2011-2146\n\n - CVE-2011-1787\n\n - CVE-2011-2145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=673267\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=690491\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-06/msg00018.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvmtools-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvmtools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvmtools0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvmtools0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools-gui-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-desktop-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-pae-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/06/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.4)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.4\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libvmtools-devel-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libvmtools0-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libvmtools0-debuginfo-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"open-vm-tools-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"open-vm-tools-debuginfo-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"open-vm-tools-debugsource-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"open-vm-tools-gui-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"open-vm-tools-gui-debuginfo-2011.05.27-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"vmware-guest-kmp-default-2011.05.27_k2.6.37.6_0.5-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"vmware-guest-kmp-default-debuginfo-2011.05.27_k2.6.37.6_0.5-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"vmware-guest-kmp-desktop-2011.05.27_k2.6.37.6_0.5-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"vmware-guest-kmp-desktop-debuginfo-2011.05.27_k2.6.37.6_0.5-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"vmware-guest-kmp-pae-2011.05.27_k2.6.37.6_0.5-0.3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"vmware-guest-kmp-pae-debuginfo-2011.05.27_k2.6.37.6_0.5-0.3.3\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"open-vm-tools\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:17:39", "bulletinFamily": "scanner", "description": "This update of open-vm-tools fixes the following vulnerabilities which\nallowed an attacker to gain root privileges within the guest system :\n\n - CVE-2011-1681\n\n - CVE-2011-2146\n\n - CVE-2011-1787\n\n - CVE-2011-2145", "modified": "2019-11-02T00:00:00", "id": "SUSE_11_3_LIBVMTOOLS-DEVEL-110607.NASL", "href": "https://www.tenable.com/plugins/nessus/75626", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : libvmtools-devel (openSUSE-SU-2011:0617-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libvmtools-devel-4693.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75626);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/10/25 13:36:41\");\n\n script_cve_id(\"CVE-2011-1681\", \"CVE-2011-1787\", \"CVE-2011-2145\", \"CVE-2011-2146\");\n\n script_name(english:\"openSUSE Security Update : libvmtools-devel (openSUSE-SU-2011:0617-1)\");\n script_summary(english:\"Check for the libvmtools-devel-4693 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of open-vm-tools fixes the following vulnerabilities which\nallowed an attacker to gain root privileges within the guest system :\n\n - CVE-2011-1681\n\n - CVE-2011-2146\n\n - CVE-2011-1787\n\n - CVE-2011-2145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=673267\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=690491\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-06/msg00018.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvmtools-devel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvmtools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libvmtools0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:open-vm-tools-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vmware-guest-kmp-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/06/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libvmtools-devel-2011.05.27-0.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libvmtools0-2011.05.27-0.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"open-vm-tools-2011.05.27-0.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"open-vm-tools-gui-2011.05.27-0.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"vmware-guest-kmp-default-2011.05.27_k2.6.34.8_0.2-0.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"vmware-guest-kmp-desktop-2011.05.27_k2.6.34.8_0.2-0.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"vmware-guest-kmp-pae-2011.05.27_k2.6.34.8_0.2-0.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"open-vm-tools\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}]}