vendor:
Workstation
by:
Tavis Ormandy, egypt
7,2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: Workstation
Affected Version From: VMWare Workstation 9.0.2 build-1031769
Affected Version To: VMWare Workstation 9.0.2 build-1031769
Patch Exists: YES
Related CWE: CVE-2013-1662
CPE: a:vmware:workstation
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2013
VMWare Setuid vmware-mount Unsafe popen(3)
VMWare Workstation (up to and including 9.0.2 build-1031769) and Player have a setuid executable called vmware-mount that invokes lsb_release in the PATH with popen(3). Since PATH is user-controlled, and the default system shell on Debian-derived distributions does not drop privs, we can put an arbitrary payload in an executable called lsb_release and have vmware-mount happily execute it as root for us.
Mitigation:
VMWare has released a patch for this vulnerability.