Executive Summary
Summary | |
---|---|
Title | VMware ESX, Workstation, Fusion, and View VMCI privilege escalation vulnerability |
Informations | |||
---|---|---|---|
Name | VMSA-2013-0002 | First vendor Publication | 2013-02-07 |
Vendor | VMware | Last vendor Modification | 2013-02-13 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. VMware VMCI privilege escalation VMware ESX, Workstation, Fusion, and View contain a vulnerability in the handling of control code in vmci.sys. A local malicious user may exploit this vulnerability to manipulate the memory allocation through the Virtual Machine Communication Interface (VMCI) code. This could result in a privilege escalation on Windows-based hosts and on Windows-based Guest Operating Systems. The vulnerability does not allow for privilege escalation from the Guest Operating System to the host (and vice versa). This means that host memory can not be manipulated from the Guest Operating System (and vice versa). Systems that have VMCI disabled are also affected by this issue. VMware would like to thank Derek Soeder of Cylance, Inc. and Kostya Kortchinsky of Microsoft for independently reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2013-1406 to this issue. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2013-0002.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17164 | |||
Oval ID: | oval:org.mitre.oval:def:17164 | ||
Title: | VMware Workstation, View address a vulnerability in the VMCI.SYS driver which could result in a privilege escalation on Windows-based hosts and on Windows-based Guest Operating Systems | ||
Description: | The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1406 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | VMware Workstation VMware View |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20352 | |||
Oval ID: | oval:org.mitre.oval:def:20352 | ||
Title: | VMware ESX, Workstation, Fusion, and View VMCI privilege escalation vulnerability | ||
Description: | The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-1406 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_esx_VMSA-2013-0002_remote.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2013-0002.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote VMware ESXi 5.0 host is affected by multiple vulnerabilities. File : vmware_esxi_5_0_build_912577_remote.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote VMware ESXi 5.1 host is affected by multiple security vulnerabilit... File : vmware_esxi_5_1_build_911593_remote.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote host has a virtualization application that is affected by a privil... File : macosx_fusion_5_0_2.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote host has a desktop solution that is affected by a privilege escala... File : vmware_view_priv_esc_vmsa_2013_0002.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote host has a virtualization application that is affected by a privil... File : vmware_workstation_priv_esc_vmsa_2013_0002.nasl - Type : ACT_GATHER_INFO |
2013-02-16 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2013-0002.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-03-05 13:26:43 |
|
2015-12-17 13:26:55 |
|
2014-11-27 13:28:44 |
|
2014-02-17 12:07:25 |
|
2013-02-13 21:22:32 |
|
2013-02-13 21:19:27 |
|
2013-02-12 17:20:39 |
|
2013-02-12 13:19:58 |
|
2013-02-08 09:19:03 |
|