VMware Fusion 4.x < 4.1.3 (VMSA-2012-0009, VMSA-2012-0011)

high Nessus Plugin ID 59818

Synopsis

The remote host has a virtualization application that is affected by multiple vulnerabilities.

Description

The version of VMware Fusion 4.x installed on the Mac OS X host is earlier than 4.1.3, and is therefore reportedly affected by the following vulnerabilities :

- Due to a flaw in the virtual floppy configuration it is possible to perform an out-of-bounds memory write. This vulnerability may allow a guest user to crash the VMX process or potentially execute code on the host. As a workaround, remove the virtual floppy drive from the list of virtual IO devices. The VMware hardening guides recommend removing unused virtual IO devices in general.
Additionally, do not allow untrusted root users in your virtual machines. Root or Administrator level permissions are required to exploit this issue.
(CVE-2012-2449)

- A memory corruption error exists related to the handling of 'Checkpoint' files that can allow arbitrary code execution. (CVE-2012-3288)

Solution

Upgrade to VMware Fusion 4.1.3 or later.

See Also

http://www.vmware.com/security/advisories/VMSA-2012-0009.html

http://www.vmware.com/security/advisories/VMSA-2012-0011.html

http://www.nessus.org/u?fb5b232d

Plugin Details

Severity: High

ID: 59818

File Name: macosx_fusion_4_1_3.nasl

Version: 1.3

Type: local

Agent: macosx

Published: 7/2/2012

Updated: 7/14/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:vmware:fusion

Required KB Items: Host/local_checks_enabled, MacOSX/Fusion/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/14/2012

Vulnerability Publication Date: 6/14/2012

Reference Information

CVE: CVE-2012-2449, CVE-2012-3288

BID: 53996