News

Two VMware Vulnerabilities Found, Fixed

A pair of vulnerabilities found in several VMware Linux products will require users to update these products to resecure their systems, security analysis firm iDefense announced yesterday.

In the first vulnerability, users can inject arbitrary code into a virtual environment when asked by the VMware program to specify a directory for shared library modules. The software's vmware-authd function grants the user root privilege for this transaction.

VMware Workstation Version 6.0.2.59824 for Linux, VMware GSX Server Version 3.2.1.14497 for Linux and VMware ESX Server 3.0.1.32039 (which does not require an operating system to run) are vulnerable.

VMware has updated its software to eliminate this vulnerability. Alternatively, iDefense recommends modifying the file permissions for the vmware-authd set-uid binary, either eliminating root access entirely or restricting its use to trusted groups.

The second vulnerability, discovered by Stephen Fewer at Harmony Security, occurs in VMware Workstation 5.5.4 with the VMware Tools package installed when it runs a guest version of Windows. This flaw allows an unprivileged user to send arbitrary code to the Windows kernel through a VMware driver called hgfs.sys, which has no access controls.

"With specially constructed input, a malicious user can use functionality within the driver to patch kernel addresses and execute arbitrary code in kernel mode," the iDefense bulletin stated.

VMware has issued a patch to correct the problem. Removal of the Tools package would also eliminate the vulnerability.

Both vulnerabilities have been been submitted to the Common Vulnerabilities and Exposures (CVE) standardized list of names for security issues. The first has been issued the identifier CVE-2008-0967 and the second CVE-2007-5671.

According to iDefense, VMware was notified about the vmware-authd vulnerability on Jan. 30 and the Tools vulnerability on Sept. 19. In both cases, the company responded the same day. The two companies issued a joint public disclosure on the vulnerabilities yesterday.

About the Author

Joab Jackson is the chief technology editor of Government Computing News (GCN.com).

Featured

  • Spaceflight Training in the Middle of a Pandemic

    Surprisingly, the worldwide COVID-19 lockdown has hardly slowed down the space training process for Brien. In fact, it has accelerated it.

  • Surface and ARM: Why Microsoft Shouldn't Follow Apple's Lead and Dump Intel

    Microsoft's current Surface flagship, the Surface Pro X, already runs on ARM. But as the ill-fated Surface RT showed, going all-in on ARM never did Microsoft many favors.

  • IT Security Isn't Supposed To Be Easy

    Joey explains why it's worth it to endure a little inconvenience for the long-term benefits of a password manager and multifactor authentication.

  • Microsoft Makes It Easier To Self-Provision PCs via Windows Autopilot When VPNs Are Used

    Microsoft announced this week that the Windows Autopilot service used with Microsoft Intune now supports enrolling devices, even in cases where virtual private networks (VPNs) might get in the way.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.