Operating System:

[Win]

Published:

09 November 2012

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.1070
        VMware Hosted Products and OVF Tool address security issues
                              9 November 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware OVF Tool
                   VMware Workstation
                   VMware Player
Publisher:         VMware
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Increased Privileges            -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-5459 CVE-2012-5458 CVE-2012-3569

Original Bulletin: 
   http://www.vmware.com/security/advisories/VMSA-2012-0015.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2012-0015
Synopsis:    VMware Hosted Products and OVF Tool address security 
             issues
Issue date:  2012-11-08
Updated on:  2012-11-08 (initial advisory)
CVE number:  CVE-2012-5458, CVE-2012-5459 and CVE-2012-3569
- - -----------------------------------------------------------------------
1. Summary

   VMware Hosted products and OVFTool patches address several security
   issues.

2. Relevant releases

   OVF Tool 2.1

   Workstation 8.0.4

   Player 4.0.4

3. Problem Description

    a. VMware Workstation and Player Weak permissions on process 
     threads vulnerability.

     Certain processes when created have weak security permissions
     assigned. It is possible to commandeer these process threads, 
     which could result in Elevation of Privilege in the context of the
     host.

     VMware would like to thank Derek Soeder of Cylance, Inc. for 
     reporting this issue to us.
    
     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CVE-2012-5458 to this issue.

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is
     available.

     VMware         Product   Running   Replace with/
     Product        Version   on        Apply Patch
     =============  ========  =======   =================
     vCenter        any       Windows   not affected

     Workstation    9.x       any       not affected
     Workstation    8.x       Windows   8.0.5
     Workstation    8.x       Linux     not affected
 
     Player         5.x       any       not affected
     Player         4.x       Windows   4.0.5 or later
     Player         4.x       Linux     not affected

     Fusion         any       Mac       not affected

     ESXi           any       ESXi      not affected

     ESX            any       ESX       not affected

    b. VMware Workstation and Player DLL binary planting vulnerability.

     Workstation and Player have a binary planting vulnerability. An
     attacker who can write their malicious executable to a system
     folder on the host, may be able to run code under certain 
     circumstances.

     VMware would like to thank Derek Soeder of Cylance, Inc. for
     reporting this issue to us.
    
     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CVE-2012-5459 to this issue.

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is
     available.

     VMware         Product   Running   Replace with/
     Product        Version   on        Apply Patch
     =============  ========  =======   =================
     vCenter        any       Windows   not affected

     Workstation    9.x       any       not affected
     Workstation    8.x       Windows   8.0.5
     Workstation    8.x       Linux     not affected

     Player         5.x       any       not affected
     Player         4.x       Windows   4.0.5 or later
     Player         4.x       Linux     not affected

     Fusion         any       Mac       not affected
 
     ESXi           any       ESXi      not affected

     ESX            any       ESX       not affected

    c. VMware OVF Tool format string vulnerability.

     The OVFTool has a format string vulnerability. Exploitation of
     this issue may lead to code execution. In order to exploit the
     issue, the attacker would need to trick the user into loading 
     their malicious OVF file.

     It is recommended that only OVF files from trusted sources should
     be used.

     VMware would like to thank Jeremy Brown of Microsoft for reporting
     this issue to us.

     The Common Vulnerabilities and Exposures project (cve.mitre.org)
     has assigned the name CVE-2012-3569 to this issue.

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is
     available.

     VMware         Product   Running   Replace with/
     Product        Version   on        Apply Patch
     =============  ========  =======   =================
     vCenter        any       Windows   not affected

     OVF Tool       3.x       any       not affected
     OVF Tool       2.1       Windows   OVF Tool 3.0.1
     OVF Tool       2.1       Linux/Mac not affected
     OVF Tool       2.0       any       not affected

     Workstation    9.x       any       not affected
     Workstation    8.x       Windows   8.0.5
     Workstation    8.x       Linux     not affected

     Player         5.x       any       not affected
     Player         4.x       Windows   4.0.5 or later
     Player         4.x       Linux     not affected

     Fusion         any       Mac       not affected

     ESXi           any       ESXi      not affected

     ESX            any       ESX       not affected

     Note: Workstation, Player and the vSphere Web Client (part of
     vCenter Server) use the OVF Tool to load OVF files. Other
     products, including vCenter Server (except vSPhere Web Client),
     ESX, and vCloud Director do not use the OVF Tool to parse OVF
     files.

4. Solution

     Please review the patch/release notes for your product and
     version and verify the checksum of your downloaded file.

     OVF Tool 3.0.1
     ------------

     https://www.vmware.com/support/developer/ovf/

     VMware Workstation 8.0.5
     ---------------------------

     https://www.vmware.com/go/downloadworkstation

     Release notes:
    
https://www.vmware.com/support/ws80/doc/releasenotes_workstation_805.html

     Player 4.0.5
     ---------------------------

     http://www.vmware.com/go/downloadplayer

     Release notes:
    
https://www.vmware.com/support/player40/doc/releasenotes_player405.html
 
5. References

     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5458
     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5459
     http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3569

- - -----------------------------------------------------------------------

6. Change log

     2012-11-08 VMSA-2012-0015
     Initial security advisory in conjunction with the release of 
     Workstation 8.0.5 and Player 4.0.5 on 2012-11-06.
- - -----------------------------------------------------------------------

7. Contact

     E-mail list for product security notifications and announcements:
     http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

     This Security Advisory is posted to the following lists:

         * security-announce at lists.vmware.com
         * bugtraq at securityfocus.com
         * full-disclosure at lists.grok.org.uk

     E-mail:  security at vmware.com
     PGP key at: http://kb.vmware.com/kb/1055

     VMware Security Advisories
     http://www.vmware.com/security/advisories

     VMware security response policy
     http://www.vmware.com/support/policies/security_response.html

     General support life cycle policy
     http://www.vmware.com/support/policies/eos.html

     VMware Infrastructure support life cycle policy
     http://www.vmware.com/support/policies/eos_vi.html

     Copyright 2012 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 2599)
Charset: utf-8

wj8DBQFQnDcoDEcm8Vbi9kMRAubuAKCXOShZM729SICtvGouQCkgvgn3KACgsWob
OhHrZlCYJ57boo6QWc+Po5Q=
=inWK
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUJxyN+4yVqjM2NGpAQIXwxAAhSnTXZfOAlbvg7rv/PBJtWxZsvH49ndY
phBshCtltMOdO91TdIZhneKCAlHSDPCMEVhuFzjYQw6umNeH4sC+h+VN3wdVVULG
QcLACOYoCNs9yl3SOhDa+dxGlojnZr5mYlfrCSCwRqX9Ouz0ScJW3FctWJWfS5em
OxYba9ZicD885Cz2ez9hHSebi0PxwomViGZiuO8VzpWwMYzdbIBMZ2ESA8H40mKZ
1SFd70wfUsM4aWeWs8CpThQmBvovIOp1NmserwXXuZ/fkydDJGlyae5ossp6lzYw
qrtZUZpmZdGkFpl2DWgSVOwiq3H1kBVbnebG7mTwrz1gnGHRWlvXCf571rPcUstO
ksDH0rOhz33KzAThhSXY8EpLCnirl+C3PoXgo/RFg29lz2xKk5mkVXii5Pznk07T
HtkWBfv29VD5ZQpYdm2PwoI0PtYG0ZRL7EcYv3DR0FzvOPQoVubkJwJUXd2pittn
1z8XJBArcO6gkj0jSfQIXgz6UUXbUDRlOdMIzNxJUmmFtNcDcZOXnqUaM6eJL3qf
O8D8vK+Ti9RtDXKfbGGLYw4w6mBHRa4eNNFVbCJZLB43zJuogmdRa8qQF0Pv0Q90
HRO0R0lf40Oyl4F892Qd0Kq0BH8pEW55BqpfI+cDpjJgTed4F0SwdEwT3cr8n+w0
JSe/TAhVDfU=
=xo4b
-----END PGP SIGNATURE-----