Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

VMware Patches Privilege Escalation Vulnerability Affecting Popular Products

Virtualization giant VMware released a series of patches on Tuesday to address a vulnerability that affects several of its popular software products that could result in a privilege escalation on older Windows-based Guest Operating Systems.

Virtualization giant VMware released a series of patches on Tuesday to address a vulnerability that affects several of its popular software products that could result in a privilege escalation on older Windows-based Guest Operating Systems.

The vulnerability (CVE-2013-3519) affects various versions of VMware’s Workstation, Fusion, ESXi and ESX products.

VMware Vulnerabilities“This [vulnerability] could result in a privilege escalation on 32-bit Guest Operating Systems running Windows 2000 Server, Windows XP or Windows 2003 Server on ESXi and ESX; or Windows XP on Workstation and Fusion,” the company noted in a security advisory.

According to the security advisory, the vulnerability falls in the “handling of control code in the LGTOSYNC.SYS driver” which could enable a local attacker to manipulate the memory allocation and result in a privilege escalation.

The vulnerability does not allow for privilege escalation from the Guest Operating System to the host, VMWare said, meaning that host memory could not be manipulated from the Guest Operating System.

Affected software products from VMware include:

VMware Workstation 9.x prior to version 9.0.3

VMware Player 5.x prior to version 5.0.3

VMware Fusion 5.x prior to version 5.0.4

Advertisement. Scroll to continue reading.

VMware ESXi 5.1 without patch ESXi510-201304102

VMware ESXi 5.0 without patch ESXi500-201303102

VMware ESXi 4.1 without patch ESXi410-201301402

VMware ESXi 4.0 without patch ESXi400-201305401

VMware ESX 4.1 without patch ESX410-201301401

VMware ESX 4.0 without patch ESX400-201305401

VMware gave credit to Derek Soeder of Cylance for reporting the vulnerability.

Additional information including patch/release notes for specific products can be found at the links below:

VMware Workstation  

VMware Player

VMware Fusion

ESXi and ESX

According to VMWare, after any patch is applied, VMware Guest Tools must be updated in any pre-existing Windows-based Guest Operating System followed by a reboot of the guest system.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.