VMware Products 'vmware-vmx' Information Disclosure Vulnerability (Windows)

2010-04-16T00:00:00
ID OPENVAS:801320
Type openvas
Reporter Copyright (c) 2010 Greenbone Networks GmbH
Modified 2017-02-21T00:00:00

Description

The host is installed with VMWare products and are prone to information disclosure vulnerability.

                                        
                                            ###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_vmware_prdts_vmx_info_disc_vuln_win.nasl 5388 2017-02-21 15:13:30Z teissa $
#
# VMware Products 'vmware-vmx' Information Disclosure Vulnerability (Windows)
#
# Authors:
# Antu Sanadi <santu@secpod.com>
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful exploitation will allow attacker to disclose potentially sensitive
  information.
  Impact Level: System/Application";
tag_solution = "For Upgrades refer the below link,
  http://www.vmware.com/security/advisories/VMSA-2010-0007.html";

tag_affected = "VMware Server 2.x,
  Vmware Player 3.0 before 3.0.1 build 227600,
  VMware Player 2.5.x before 2.5.4 build 246459,
  VMware Workstation  7.0 before 7.0.1 build 227600,
  VMware Workstation 6.5.x before 6.5.4 build 246459 and
  VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459";
tag_insight = "The flaw is due to error in 'virtual networking stack' when interacting between the 
  guest OS and host 'vmware-vmx' process, which allows attackers to obtain sensitive
  information from memory on the host OS by examining received network packets.";
tag_summary = "The host is installed with VMWare products and are prone to
  information disclosure vulnerability.";

if(description)
{
  script_id(801320);
  script_version("$Revision: 5388 $");
  script_tag(name:"last_modification", value:"$Date: 2017-02-21 16:13:30 +0100 (Tue, 21 Feb 2017) $");
  script_tag(name:"creation_date", value:"2010-04-16 16:17:26 +0200 (Fri, 16 Apr 2010)");
  script_cve_id("CVE-2010-1138");
  script_bugtraq_id(39395);
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_name("VMware Products 'vmware-vmx' Information Disclosure Vulnerability (Windows)");
  script_xref(name : "URL" , value : "http://secunia.com/advisories/39215");
  script_xref(name : "URL" , value : "http://secunia.com/advisories/39206");
  script_xref(name : "URL" , value : "http://lists.vmware.com/pipermail/security-announce/2010/000090.html");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2010 Greenbone Networks GmbH");
  script_family("General");
  script_dependencies("gb_vmware_prdts_detect_win.nasl");
  script_require_keys("VMware/Win/Installed");
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("version_func.inc");

if(!get_kb_item("VMware/Win/Installed")){
  exit(0);
}

# Check for VMware Player
vmplayerVer = get_kb_item("VMware/Player/Win/Ver");
if(vmplayerVer != NULL )
{
  if(version_is_equal(version:vmplayerVer, test_version:"3.0.0") ||
     version_in_range(version:vmplayerVer, test_version:"2.5", test_version2:"2.5.3"))
  {
    security_message(0);
    exit(0);
  }
}


#Check for VMware Workstation
vmworkstnVer = get_kb_item("VMware/Workstation/Win/Ver");
if(vmworkstnVer != NULL)
{
  if(version_is_equal(version:vmworkstnVer, test_version:"7.0.0") ||
     version_in_range(version:vmworkstnVer, test_version:"6.5", test_version2:"6.5.3"))
  {
      security_message(0);
      exit(0);
  }
}

# VMware ACE
aceVer = get_kb_item("VMware/ACE/Win/Ver");
if(!aceVer)
{
  aceVer = get_kb_item("VMware/ACE\Dormant/Win/Ver");
  if(aceVer)
  {
    if(version_is_equal(version:aceVer, test_version:"2.6.0") ||
       version_in_range(version:aceVer, test_version:"2.5", test_version2:"2.5.3"))
    {
      security_message(0);
      exit(0);
    }
  }
}

# VMware Server
vmserVer = get_kb_item("VMware/Server/Win/Ver");
if(vmserVer)
{
  if(vmserVer =~ "^2.*"){
   security_message(0);
  }
}