VMware Fusion < 3.1.3 (VMSA-2011-0009 / VMSA-2011-0011)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote host has a virtualization application affected by multiple

Description :

The version of VMware Fusion installed on the Mac OS X host is
earlier than 3.1.3. As such, it is reportedly affected by the
following three security vulnerabilities :

- An attacker with access to a Guest operating system can
determine if a path exists in the Host filesystem and
whether it's a file or a directory regardless of
permissions. (CVE-2011-2146)

- A race condition in mount.vmhgfs may allow an attacker
with access to a Guest to mount on arbitrary directories
in the Guest filesystem and escalate their privileges if
they can control the contents of the mounted directory.

- A procedural error allows an attacker with access to a
Solaris or FreeBSD Guest operating system to gain write
access to an arbitrary file in the Guest filesystem.

- A buffer overflow in the way UDF file systems are
handled could allow for code execution if a specially
crafted ISO image is used. (CVE-2011-3868)

Note that the first three vulnerabilities only affect non-Windows
guest operating systems.

See also :


Solution :

Upgrade to VMware Fusion 3.1.3 or later.

In addition to patching, VMware Tools must be updated on all non-
Windows guest VMs in order to completely mitigate certain
vulnerabilities. Refer to the VMware advisory for more information.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.6
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 54974 ()

Bugtraq ID: 48098

CVE ID: CVE-2011-1787

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now