VMware vmnat.exe/vmnet-natd Multiple FTP Command Remote Overflow

critical Nessus Plugin ID 20729

Synopsis

It is possible to execute code on the remote system.

Description

According to its version number, the VMware program on the remote host may allow an attacker to execute code on the system hosting the VMware instance.

The vulnerability can be exploited by sending specially crafted FTP PORT and EPRT requests.

To be exploitable, the VMware system must be configured to use NAT networking.

Solution

Upgrade to :

- VMware Workstation 5.5.1 or higher
- VMware Workstation 4.5.2 or higher
- VMware Player 1.0.1 or higher
- VMware GSX Server 3.2.1 or higher.

See Also

http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000

Plugin Details

Severity: Critical

ID: 20729

File Name: vmware_remote.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 1/16/2006

Updated: 8/6/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:vmware:vmware_player, cpe:/a:vmware:vmware_workstation, cpe:/a:vmware:gsx_server

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/20/2005

Reference Information

CVE: CVE-2005-4459

BID: 15998