複数の VMware 製品の vmrun における権限昇格の脆弱性
| Title |
複数の VMware 製品の vmrun における権限昇格の脆弱性
|
| Summary |
複数の VMware 製品の vmrun には、フォーマットストリングの処理に関して不備があるため、権限を取得される脆弱性が存在します。
|
| Possible impacts |
ローカルユーザにより、プロセスのメタデータのフォーマットストリング指定子を介して、権限を取得される可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
April 9, 2010, midnight |
| Registration Date |
May 7, 2010, 5:25 p.m. |
| Last Update |
May 7, 2010, 5:25 p.m. |
|
CVSS2.0 : 危険
|
| Score |
7.2
|
| Vector |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| VMware |
|
VMware Fusion 2.x
|
|
VMware Player 2.5.x
|
|
VMware Server 2.x
|
|
VMware VIX API 1.6.x
|
|
VMware Workstation 6.5.x
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2010年05月07日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2010-1139
| Summary |
Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata.
|
| Publication Date |
April 13, 2010, 3:30 a.m. |
| Registration Date |
Jan. 29, 2021, 10:59 a.m. |
| Last Update |
May 15, 2013, 12:07 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:* |
|
|
|
|
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vix_api:1.6.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vix_api:1.6.1:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List