Vulnerability Name:

CVE-2010-4297 (CCN-63643)

Assigned:2010-12-02
Published:2010-12-02
Updated:2018-10-10
Summary:The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a "command injection" issue.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.9 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.1 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4297

Source: CCN
Type: VMSA-2010-0018
VMware hosted products and ESX patches resolve multiple security issues

Source: MLIST
Type: UNKNOWN
[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues

Source: OSVDB
Type: UNKNOWN
69590

Source: CCN
Type: SA42480
VMware Products VMware Tools Command Injection Vulnerability

Source: SECUNIA
Type: Vendor Advisory
42480

Source: CCN
Type: SA42482
VMware Server Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
42482

Source: CCN
Type: SECTRACK ID: 1024819
VMware Movie Decoder Heap Overflow in Decompression Routine Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: SECTRACK ID: 1024820
VMware Race Conditions and Input Validation Flaw Let Local Users on the Host Operating System Gain Elevated Privileges

Source: CCN
Type: OSVDB ID: 69590
VMware Tools Update Guest System Unspecified Arbitrary Command Injection

Source: BUGTRAQ
Type: UNKNOWN
20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues

Source: BID
Type: UNKNOWN
45166

Source: CCN
Type: BID-45166
VMware Hosted Products VMware Tools Command Injection Vulnerability

Source: SECTRACK
Type: UNKNOWN
1024819

Source: SECTRACK
Type: UNKNOWN
1024820

Source: CONFIRM
Type: Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2010-0018.html

Source: VUPEN
Type: Vendor Advisory
ADV-2010-3116

Source: XF
Type: UNKNOWN
vmware-vmwaretools-command-execution(63643)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [12-09-2010]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1.2:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:vmware:player:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:3.1.2:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:vmware:fusion:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:2.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:2.0.2:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:vmware:esxi:3.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esxi:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esxi:4.1:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:vmware:esx:3.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esx:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esx:4.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esxi:3.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esxi:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware workstation 6.5.0
    vmware workstation 6.5.1
    vmware workstation 6.5.2
    vmware workstation 6.5.3
    vmware workstation 6.5.5
    vmware workstation 7.0
    vmware workstation 7.0.1
    vmware workstation 7.1
    vmware workstation 7.1.1
    vmware workstation 7.1.2
    vmware player 2.5
    vmware player 2.5.1
    vmware player 2.5.2
    vmware player 2.5.3
    vmware player 2.5.4
    vmware player 2.5.5
    vmware player 3.1
    vmware player 3.1.1
    vmware player 3.1.2
    vmware fusion 2.0
    vmware fusion 2.0.1
    vmware fusion 2.0.2
    vmware fusion 2.0.3
    vmware fusion 2.0.4
    vmware fusion 2.0.5
    vmware fusion 2.0.6
    vmware fusion 2.0.7
    vmware fusion 2.0.8
    vmware fusion 3.1
    vmware fusion 3.1.1
    vmware fusion 3.1.2
    vmware server 2.0.2
    vmware esxi 3.5
    vmware esxi 4.0
    vmware esxi 4.1
    vmware esx 3.5
    vmware esx 4.0
    vmware esx 4.1
    vmware workstation 6.0
    vmware esxi 3.5
    vmware esx server 4.0
    vmware player 2.0.1
    vmware esxi 4.0
    vmware workstation 7.0
    vmware player 3.0