VMware Patches VM Vulnerability

Monday, February 11, 2013 @ 01:02 PM gHale

VMware issued an update last week that fixes a virtual machine communication interface (VMCI) vulnerability in its ESX Server, Workstation, Fusion and View products that could lead to a privilege escalation if unpatched.

A local attacker could potentially exploit a control code handling vulnerability in vmci.sys in order to tamper with memory allocation in the VMCI code and eventually obtain elevated privileges on Windows-based hosts and guest operating systems, the virtualization software maker said.

Cloud Security: Third Party Code
Cloud-Based Browsers Very Hackable
Cloud Ripe for Botnet Attacks
Cloud Confusion: Data Ownership

The vulnerabilities affect systems running Workstation 9.0 as well as versions prior to 8.0.5; Fusion 5.x prior to version 5.0.2 and 4.x prior to version 4.1.4; View 5.x prior to version 5.1.2 and 4.x prior to version 4.6.2; ESXi 5.1 without ESXi510-201212102-SG, 5.0 without ESXi500-201212102-SG, 4.1 without ESXi410-201211402-BG, and 4.0 without ESXi400-201302402-SG; and ESX 4.1 without ESX410-201211401-SG and 4.0 without ESX400-201302401-SG.

VMware users should read the patch release details and update their systems accordingly, the company said.

VMware gives credit to Cylance Inc.’s Derek Soeder and Microsoft’s Kostya Kortchinsky for independently reporting the bug to them.

Leave a Reply

You must be logged in to post a comment.