Vulnerability Name:

CVE-2011-1126 (CCN-66472)

Assigned:2011-03-29
Published:2011-03-29
Updated:2018-10-09
Summary:VMware vmrun, as used in VIX API 1.x before 1.10.3 and VMware Workstation 6.5.x and 7.x before 7.1.4 build 385536 on Linux, might allow local users to gain privileges via a Trojan horse shared library in an unspecified directory.
CVSS v3 Severity:8.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.1 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2011-1126

Source: MLIST
Type: Vendor Advisory
[security-announce] 20110330 UPDATED VMSA-2011-0006.1 VMware vmrun utility local privilege escalation

Source: CCN
Type: SA43885
VMware Workstation vmrun Privilege Escalation Security Issue

Source: SECUNIA
Type: Vendor Advisory
43885

Source: CCN
Type: SA43943
VMware VIX API vmrun Privilege Escalation Security Issue

Source: SECUNIA
Type: Vendor Advisory
43943

Source: SREASON
Type: UNKNOWN
8173

Source: SECTRACK
Type: UNKNOWN
1025270

Source: CCN
Type: OSVDB ID: 71783
VMware Workstation vmrun Unspecified Shared Library Local Privilege Escalation

Source: BUGTRAQ
Type: UNKNOWN
20110330 VMSA-2011-0006 VMware vmrun utility local privilege escalation

Source: BID
Type: UNKNOWN
47094

Source: CCN
Type: BID-47094
VMware 'vmrun' on Linux Local Privilege Escalation Vulnerability

Source: CCN
Type: BID-48058
Red Hat Xen Hypervisor Implementation Local Guest Denial Of Service Vulnerability

Source: CONFIRM
Type: Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2011-0006.html

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0816

Source: XF
Type: UNKNOWN
vmware-vmrun-privilege-escalation(66472)

Source: XF
Type: UNKNOWN
vmware-vmrun-privilege-escalation(66472)

Source: CCN
Type: VMSA-2011-0006
VMware vmrun utility local privilege escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:vix_api:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.7:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.8:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vix_api:1.9:*:*:*:*:*:*:*
  • AND
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:workstation:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.1.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware vix api 1.0
    vmware vix api 1.1
    vmware vix api 1.1.1
    vmware vix api 1.1.2
    vmware vix api 1.1.3
    vmware vix api 1.1.4
    vmware vix api 1.1.5
    vmware vix api 1.6.0
    vmware vix api 1.6.1
    vmware vix api 1.7
    vmware vix api 1.8
    vmware vix api 1.8.1
    vmware vix api 1.9
    linux linux kernel *
    vmware workstation 6.5.0
    vmware workstation 6.5.1
    vmware workstation 6.5.2
    vmware workstation 6.5.3
    vmware workstation 6.5.4
    vmware workstation 6.5.5
    vmware workstation 7.0
    vmware workstation 7.0.1
    vmware workstation 7.1
    vmware workstation 7.1.1
    vmware workstation 7.1.2
    vmware workstation 7.1.3
    linux linux kernel *
    vmware workstation 6.5.5
    vmware workstation 7.1.3