First published: Wed Feb 21 2007(Updated: )
VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, accessing hardware components, and stopping the "VMware tools service" service. NOTE: exploitation is simplified via (1) weak file permissions (Users = Read & Execute) for %PROGRAMFILES%\VMware; and weak registry key permissions (access by Users) for (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga, and (6) vmxnet in HKLM\SYSTEM\CurrentControlSet\Services\; which allows local users to perform various privileged actions outside of the guest OS by executing certain files under %PROGRAMFILES%\VMware\VMware Tools, as demonstrated by (a) VMControlPanel.cpl and (b) vmwareservice.exe.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | =5.5.3_build_34685 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1056 is considered a moderate severity vulnerability due to its potential for local exploitation.
To fix CVE-2007-1056, upgrade VMware Workstation to a version later than 5.5.3 build 34685.
CVE-2007-1056 allows local users to perform privileged actions such as changing system time and accessing hardware components.
Users of VMware Workstation version 5.5.3 build 34685 are affected by CVE-2007-1056.
Exploitation of CVE-2007-1056 may lead to unauthorized control over critical system functions.