Computer Security
[EN] securityvulns.ru no-pyccku


VMWare multiple security vulnerabilities
Published:29.10.2009
Source:
SecurityVulns ID:10360
Type:local
Threat Level:
6/10
Description:Privilege escalation in guest system. Directory traversal on access from guest to host system.
Affected:VMWARE : VMware Server 1.0
 VMWARE : VMware ESXi 3.5
 VMWARE : VMware ESX 3.5
 VMWARE : VMware Workstation 6.5
 VMWARE : VMware Player 2.5
 VMWARE : VMware ACE 2.5
 VMWARE : VMware Server 2.0
 VMWARE : VMware Fusion 2.0
 VMWARE : VMware ESXi 4.0
 VMWARE : VMware ESX 4.0
CVE:CVE-2009-3733 (Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.)
 CVE-2009-2267 (VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.)
Original documentdocumentVMWARE, Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation (29.10.2009)
 documentVMWARE, VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues (29.10.2009)
Files:VMWare Workstation Virtual 8086 Linux Local ring0 exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod