VMware Products Multiple Vulnerabilities (VMSA-2010-0007)

high Nessus Plugin ID 45541

Language:

Synopsis

The remote host has a virtualization application affected by multiple vulnerabilities.

Description

A VMware product (Player, Workstation, or Movie Decoder) detected on the remote host has one or more of the following vulnerabilities :

- The VMnc media codec has multiple heap overflow vulnerabilities. A remote attacker could exploit these issues by tricking a user into requesting a malicious web page or opening a malicious file.
(CVE-2009-1564, CVE-2009-1565)

- A flaw in the 3rd party libpng library could allow an attacker to read sensitive portions of memory.
(CVE-2009-2042)

- A flaw in vmware-authd could lead to a denial of service service on Windows-based hosts. (CVE-2009-3707)

- A format string vulnerability exists in the VMware Remote Console Plug-in. A remote attacker could exploit this by tricking a user into requesting a malicious web page, resulting in arbitrary code execution.
(CVE-2009-3732)

- A flaw in the virtual networking stack could result in an information leak, causing memory from a guest VM to be sent to host's physical network. (CVE-2010-1138)

- A vulnerability in the USB service allows a local attacker to elevate privileges by placing a malicious file in a certain location. This vulnerability only affects Workstation and Player installed on Windows.
(CVE-2010-1140)

- A flaw in the way VMware libraries are referenced could allow a remote attacker to execute arbitrary code in a guest Windows VM by tricking a user into requesting a malicious file. (CVE-2010-1141)

- A flaw in the way VMware executables are loaded could allow a malicious user to execute arbitrary code in a guest Windows VM by planting a malicious file in a a certain location. (CVE-2010-1142)

Solution

Upgrade to :

- VMware Workstation 6.5.4 / 7.0.1 or later.
- VMware Player 2.5.4 / 3.0.1 or later.
- VMware Movie Decoder (standalone) 6.5.4 or later.
- VMware Remote Console Plug-in latest version (refer to the advisory for instructions)

In addition to patching, VMware Tools must be updated on all guest VMs in order to completely mitigate certain vulnerabilities. Refer to the VMware advisory for more information.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2009-36/

https://secuniaresearch.flexerasoftware.com/secunia_research/2009-37/

https://www.nessus.org/u?8db51821

http://www.acrossecurity.com/aspr/ASPR-2010-04-12-1-PUB.txt

http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt

https://www.nessus.org/u?82037430

https://seclists.org/bugtraq/2010/Apr/76

https://www.vmware.com/security/advisories/VMSA-2010-0007.html

Plugin Details

Severity: High

ID: 45541

File Name: vmware_multiple_vmsa_2010_0007.nasl

Version: 1.23

Type: local

Agent: windows

Family: Windows

Published: 4/15/2010

Updated: 3/27/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2009-3732

Vulnerability Information

CPE: cpe:/a:vmware:vmware_player, cpe:/a:vmware:vmware_workstation

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/9/2010

Vulnerability Publication Date: 4/9/2010

Reference Information

CVE: CVE-2009-1564, CVE-2009-1565, CVE-2009-2042, CVE-2009-3707, CVE-2009-3732, CVE-2010-1138, CVE-2010-1140, CVE-2010-1141, CVE-2010-1142

BID: 39345, 39363, 39364, 39392, 39394, 39395, 39396, 39397

CWE: 134, 200

IAVA: 2010-A-0066-S

Secunia: 36712, 39206

VMSA: 2010-0007