Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

VMware Patches Privilege Escalation Vulnerability Affecting Popular Products

Virtualization giant VMware released a series of patches on Tuesday to address a vulnerability that affects several of its popular software products that could result in a privilege escalation on older Windows-based Guest Operating Systems.

Virtualization giant VMware released a series of patches on Tuesday to address a vulnerability that affects several of its popular software products that could result in a privilege escalation on older Windows-based Guest Operating Systems.

The vulnerability (CVE-2013-3519) affects various versions of VMware’s Workstation, Fusion, ESXi and ESX products.

VMware Vulnerabilities“This [vulnerability] could result in a privilege escalation on 32-bit Guest Operating Systems running Windows 2000 Server, Windows XP or Windows 2003 Server on ESXi and ESX; or Windows XP on Workstation and Fusion,” the company noted in a security advisory.

According to the security advisory, the vulnerability falls in the “handling of control code in the LGTOSYNC.SYS driver” which could enable a local attacker to manipulate the memory allocation and result in a privilege escalation.

The vulnerability does not allow for privilege escalation from the Guest Operating System to the host, VMWare said, meaning that host memory could not be manipulated from the Guest Operating System.

Affected software products from VMware include:

VMware Workstation 9.x prior to version 9.0.3

VMware Player 5.x prior to version 5.0.3

VMware Fusion 5.x prior to version 5.0.4

Advertisement. Scroll to continue reading.

VMware ESXi 5.1 without patch ESXi510-201304102

VMware ESXi 5.0 without patch ESXi500-201303102

VMware ESXi 4.1 without patch ESXi410-201301402

VMware ESXi 4.0 without patch ESXi400-201305401

VMware ESX 4.1 without patch ESX410-201301401

VMware ESX 4.0 without patch ESX400-201305401

VMware gave credit to Derek Soeder of Cylance for reporting the vulnerability.

Additional information including patch/release notes for specific products can be found at the links below:

VMware Workstation  

VMware Player

VMware Fusion

ESXi and ESX

According to VMWare, after any patch is applied, VMware Guest Tools must be updated in any pre-existing Windows-based Guest Operating System followed by a reboot of the guest system.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is founder and director of several leading cybersecurity industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.