CVE-2009-3732 : Détail

CVE-2009-3732

56.71%V3
Network
2010-04-12
16h00 +00:00
2013-05-15
07h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Format string vulnerability in vmware-vmrc.exe build 158248 in VMware Remote Console (aka VMrc) allows remote attackers to execute arbitrary code via unspecified vectors.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 12188

Date de publication : 2010-04-11 22h00 +00:00
Auteur : Alexey Sintsov
EDB Vérifié : Yes

[DSECRG-09-053] VMware Remote Console - format string vulnerability http://www.dsecrg.com/pages/vul/show.php?id=153 VMrc vulnerable to format string attacks. Exploitation of this issue may lead to arbitrary code execution on the system where VMrc is installed. Digital Security Research Group [DSecRG] Advisory DSECRG-09-053 Application: VMware Remoute Console Version: e.x.p build-158248 Vendor URL: http://vmware.com Bugs: Format String Vulnerabilitys Exploits: YES (PoC) Reported: 07.08.2009 Vendor response: 13.08.2009 Date of Public Advisory: 09.04.2010 CVE: CVE-2009-3732 VSA: VMSA-2010-0007 Authors: Alexey Sintsov of Digital Security Research Group [DSecRG] (research [at] dsecrg [dot] com) Description ******** VMware Remote Console Plug-in can be installed from WEB interface of VMware vSphere. This software contains of ActiveX objects and executable files for remote console of guest OS. VMrc vulnerable to format string attacks. Exploitation of this issue may lead to arbitrary code execution on the system where VMrc is installed. Details ******* Attacker can make shortcut with special parameters for vmware-vmrc.exe and bad MOID or HOST parameter. If a user try to use this shortcut to connect to vSphere server he will see next message box: "Error opening the remote virtual machine HOST\MOID: The object has already been deleted or has not been completely created." If user name or password will be incorrect the user also gets error message box. Parameters HOST and MOID are addicted to format injection. Also this vuln. can be exploited remotely by special crafted html page. ActiveX element: clsid:B94C2238-346E-4C5E-9B36-8CC627F35574 Attacker can rewrite stack data and may be it's possible to code execution. Example(shortcut): ***************** C:\Program Files\Common Files\VMware\VMware Remote Console Plug-in>vmware-vmrc.exe -u vmware_user -h HOST -M AAAA:%x.%x.%x.%x.:BBBB VMDlg::ShowDialog: Error opening the remote virtual machine HOST\AAAA:3455600.78138a94.100012b2.28e27b0.:BBBB: Example(ActiveX): **************** objectVMRC.connect ("host" ,"username" ,"password", "%x:%x:%x:%x:%x:%x:%x:%x:%x" ,"X" ,2); Fix Information *************** VMware has released the following patch for ESX 4.0: ESX400-200911223-UG Also this issue solved in vCenter 4.0 Update 1 References ********** http://dsecrg.com/pages/vul/show.php?id=153 http://lists.vmware.com/pipermail/security-announce/2010/000090.html About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsecrg [dot] com http://www.dsecrg.com

Products Mentioned

Configuraton 0

Vmware>>Ace >> Version From (including) 2.5.0 To (excluding) 2.5.4

    Vmware>>Ace >> Version 2.6

    Vmware>>Player >> Version From (including) 2.5.0 To (excluding) 2.5.4

    Vmware>>Player >> Version 3.0

    Vmware>>Server >> Version From (including) 2.0.0 To (including) 2.0.2

    Vmware>>Workstation >> Version From (including) 6.5.0 To (excluding) 6.5.4

    Vmware>>Workstation >> Version 7.0

    Microsoft>>Windows >> Version -

    Références

    http://security.gentoo.org/glsa/glsa-201209-25.xml
    Tags : vendor-advisory, x_refsource_GENTOO
    http://secunia.com/advisories/39110
    Tags : third-party-advisory, x_refsource_SECUNIA