SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   VMware Vendors:   VMware, Inc.
VMware Networking Stack Memory Leak Lets Local Users Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1023836
SecurityTracker URL:  http://securitytracker.com/id/1023836
CVE Reference:   CVE-2010-1138   (Links to External Site)
Updated:  Apr 13 2010
Original Entry Date:  Apr 9 2010
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation (Windows, Linux) 6.5.x, 7.0; Player (Windows, Linux) 2.5.x, 3.0; Ace (Windows) 2.5.x, 2.6; Fusion (Mac OS/X) 2.x, 3.0
Description:   A vulnerability was reported in VMware. A local user can obtain potentially sensitive information.

A local user on the guest operating system can cause memory from the host operating system to be sent to the virtual network adapter and potentially to the host's physical Ethernet wire.

Johann MacDonagh reported this vulnerability.

Impact:   A local user can on the guest operating system can obtain potentially sensitive information from the host operating system's networking stack.
Solution:   The vendor has issued a fix (Workstation 6.5.4 build 246459, 7.0.1 build 227600; Player 2.5.4 build 246459, 3.0.1 build 227600; Ace 2.5.4 build 246459, 2.6.1 build 227600; Fusion 2.0.7 build 246742, 3.0.1 build 232708).

The vendor's advisory will be available at:

http://www.vmware.com/security/advisories/

Vendor URL:  www.vmware.com/security/advisories/ (Links to External Site)
Cause:   Access control error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Fri, 09 Apr 2010 16:40:29 +0000
Subject:  VMware


h. Potential information leak via hosted networking stack

    A vulnerability in the virtual networking stack of VMware hosted
    products could allow host information disclosure.

    A guest operating system could send memory from the host vmware-vmx
    process to the virtual network adapter and potentially to the
    host's physical Ethernet wire.

    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the name CVE-2010-1138 to this issue.

    VMware would like to thank Johann MacDonagh for reporting this
    issue to us.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    Workstation    7.0       any      7.0.1 build 227600 or later
    Workstation    6.5.x     Windows  6.5.4 build 246459 or later
    Workstation    6.5.x     Linux    not affected

    Player         3.0       any      3.0.1 build 227600 or later
    Player         2.5.x     Windows  2.5.4 build 246459 or later
    Player         2.5.x     Linux    not affected

    Ace            2.6       Windows  2.6.1 build 227600 or later
    Ace            2.5.x     Windows  2.5.4 build 246459 or later

    Server         2.x       any      not being fixed at this time

    Fusion         3.0       Mac OS/X 3.0.1 build 232708 or later
    Fusion         2.x       Mac OS/X 2.0.7 build 246742 or later

    ESXi           any       any      not affected

    ESX            any       any      not affected


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC