VMware Fusion < 3.1.3 (VMSA-2011-0009 / VMSA-2011-0011)
High Nessus Plugin ID 54974
SynopsisThe remote host has a virtualization application affected by multiple vulnerabilities.
DescriptionThe version of VMware Fusion installed on the Mac OS X host is earlier than 3.1.3. As such, it is reportedly affected by the following three security vulnerabilities :
- An attacker with access to a Guest operating system can determine if a path exists in the Host filesystem and whether it's a file or a directory regardless of permissions. (CVE-2011-2146)
- A race condition in mount.vmhgfs may allow an attacker with access to a Guest to mount on arbitrary directories in the Guest filesystem and escalate their privileges if they can control the contents of the mounted directory.
- A procedural error allows an attacker with access to a Solaris or FreeBSD Guest operating system to gain write access to an arbitrary file in the Guest filesystem.
- A buffer overflow in the way UDF file systems are handled could allow for code execution if a specially crafted ISO image is used. (CVE-2011-3868)
Note that the first three vulnerabilities only affect non-Windows guest operating systems.
SolutionUpgrade to VMware Fusion 3.1.3 or later.
In addition to patching, VMware Tools must be updated on all non- Windows guest VMs in order to completely mitigate certain vulnerabilities. Refer to the VMware advisory for more information.