Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200601-04 ] VMware Workstation: Vulnerability in NAT networking
Date: Sat, 07 Jan 2006 21:29:39
Message-Id: 200601072209.55616.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200601-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: VMware Workstation: Vulnerability in NAT networking
9 Date: January 07, 2006
10 Bugs: #116238
11 ID: 200601-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 VMware guest operating systems can execute arbitrary code with elevated
19 privileges on the host operating system through a flaw in NAT
20 networking.
21
22 Background
23 ==========
24
25 VMware Workstation is a powerful virtual machine for developers and
26 system administrators.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 vmware-workstation < 5.5.1.19175 >= 5.5.1.19175
35 *>= 4.5.3.19414
36
37 Description
38 ===========
39
40 Tim Shelton discovered that vmnet-natd, the host module providing
41 NAT-style networking for VMware guest operating systems, is unable to
42 process incorrect 'EPRT' and 'PORT' FTP requests.
43
44 Impact
45 ======
46
47 Malicious guest operating systems using the NAT networking feature or
48 local VMware Workstation users could exploit this vulnerability to
49 execute arbitrary code on the host system with elevated privileges.
50
51 Workaround
52 ==========
53
54 Disable the NAT service by following the instructions at
55 http://www.vmware.com/support/kb, Answer ID 2002.
56
57 Resolution
58 ==========
59
60 All VMware Workstation users should upgrade to a fixed version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose app-emulation/vmware-workstation
64
65 References
66 ==========
67
68 [ 1 ] CVE-2005-4459
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4459
70 [ 2 ] VMware Security Response
71 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200601-04.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2006 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.0