// For flags

CVE-2007-1056

 

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, accessing hardware components, and stopping the "VMware tools service" service. NOTE: exploitation is simplified via (1) weak file permissions (Users = Read & Execute) for %PROGRAMFILES%\VMware; and weak registry key permissions (access by Users) for (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga, and (6) vmxnet in HKLM\SYSTEM\CurrentControlSet\Services\; which allows local users to perform various privileged actions outside of the guest OS by executing certain files under %PROGRAMFILES%\VMware\VMware Tools, as demonstrated by (a) VMControlPanel.cpl and (b) vmwareservice.exe.

VMware Workstation versión 5.5.3 build 34685, no proporciona restricciones por usuario en ciertas acciones privilegiadas, lo que permite a los usuarios locales realizar operaciones restringidas, tales como cambiar la hora del sistema, acceder a los componentes de hardware y detener el servicio "VMware tools service". NOTA: la explotación es simplificada por medio de (1) permisos de archivos débiles (Users = Read & Execute) para %PROGRAMFILES%\VMware; y permisos de clave de registro débiles (access by Users) para (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga y (6) vmxnet en HKLM\SYSTEM\CurrentControlSet\Services\; lo que permite a los usuarios locales realizar varias acciones privilegiadas fuera del sistema operativo invitado por medio de la ejecución de ciertos archivos bajo herramientas %PROGRAMFILES%\VMware\VMware, como es demostrado por (a) VMControlPanel.cpl y (b) vmwareservice.exe.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-02-21 CVE Reserved
  • 2007-02-21 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
5.5.3_build_34685
Search vendor "Vmware" for product "Workstation" and version "5.5.3_build_34685"
-
Affected