Page 10 of 49 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, accessing hardware components, and stopping the "VMware tools service" service. NOTE: exploitation is simplified via (1) weak file permissions (Users = Read & Execute) for %PROGRAMFILES%\VMware; and weak registry key permissions (access by Users) for (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga, and (6) vmxnet in HKLM\SYSTEM\CurrentControlSet\Services\; which allows local users to perform various privileged actions outside of the guest OS by executing certain files under %PROGRAMFILES%\VMware\VMware Tools, as demonstrated by (a) VMControlPanel.cpl and (b) vmwareservice.exe. VMware Workstation versión 5.5.3 build 34685, no proporciona restricciones por usuario en ciertas acciones privilegiadas, lo que permite a los usuarios locales realizar operaciones restringidas, tales como cambiar la hora del sistema, acceder a los componentes de hardware y detener el servicio "VMware tools service". NOTA: la explotación es simplificada por medio de (1) permisos de archivos débiles (Users = Read & Execute) para %PROGRAMFILES%\VMware; y permisos de clave de registro débiles (access by Users) para (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga y (6) vmxnet en HKLM\SYSTEM\CurrentControlSet\Services\; lo que permite a los usuarios locales realizar varias acciones privilegiadas fuera del sistema operativo invitado por medio de la ejecución de ciertos archivos bajo herramientas %PROGRAMFILES%\VMware\VMware, como es demostrado por (a) VMControlPanel.cpl y (b) vmwareservice.exe. • http://osvdb.org/45244 http://securityreason.com/securityalert/2281 http://www.securityfocus.com/archive/1/460664/100/0/threaded http://www.securityfocus.com/archive/1/461807/100/0/threaded • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

VMware Workstation 5.5.3 34685, when the "Enable copy and paste to and from this virtual machine" option is enabled, preserves clipboard data on the guest operating system after it was deleted on the host operating system, which might allow local users to read clipboard contents by moving the focus back to the host operating system. VMware Workstation 5.5.3 34685, cuando la opción "habilitar cortar y pegar desde y hacia esta máquina virtual" ("Enable copy and paste to and from this virtual machine") está habilitada, conserva los datos en el porta papeles del sistema operativo del invitado, después de que estos han sido borrados del sistema operativo del host, lo que puede permitir a usuarios locales leer el contenido del porta papeles devolviendo el foco de nuevo al sistema operativo del host. • http://osvdb.org/33221 http://www.securityfocus.com/archive/1/459140/100/0/threaded http://www.securityfocus.com/bid/22413 •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

VMware Workstation 5.5.3 34685 does not immediately change the availability of a shared clipboard when the "Enable copy and paste to and from this virtual machine" checkbox is changed, which allows local users to obtain sensitive information or conduct certain attacks that are facilitated by weaker isolation between the host and guest operating systems. VMware Workstation 5.5.3 34685 no cambia inmediatamente la disponibilidad de un porta papeles compartido cuando se cambia el check en el "habilitar cortar y pegar desde y hacia esta máquina virtual" ("Enable copy and paste to and from this virtual machine"), lo que permite a usuarios locales la obtención de información sensible o llevar a cabo ciertos ataques que facilitan un aislamiento débil entre el host y los sistemas operativos de los invitados. • http://osvdb.org/33222 http://www.securityfocus.com/archive/1/459140/100/0/threaded http://www.securityfocus.com/bid/22413 •

CVSS: 3.6EPSS: 0%CPEs: 11EXPL: 0

vmware-config.pl in VMware for Linux, ESX Server 2.x, and Infrastructure 3 does not check the return code from a Perl chmod function call, which might cause an SSL key file to be created with an unsafe umask that allows local users to read or modify the SSL key. vmware-config.pl en VMware for Linux, ESX Server 2.x, y Infrastructure 3 no valida el código de retorno desde la llamada a la función Perl chmod, lo cual podría permitir un fichero llave SSL sea creado con una umask no segura que permite a usuarios locales leer o modificar la llave SSL. • http://kb.vmware.com/kb/2467205 http://secunia.com/advisories/21120 http://secunia.com/advisories/23680 http://securitytracker.com/id?1016536 http://www.osvdb.org/27418 http://www.securityfocus.com/archive/1/440583/100/0/threaded http://www.securityfocus.com/archive/1/441082/100/0/threaded http://www.securityfocus.com/archive/1/456546/100/200/threaded http://www.securityfocus.com/bid/19060 http://www.securityfocus.com/bid/19062 http://www.vmware.com/support/esx2 •