First published: Thu Jun 05 2008(Updated: )
Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =3.3 | |
VMware Player | =1.0.6 | |
VMware Server | =1.0.1 | |
VMware Player | =2.0.1 | |
VMware Player | =2.0.2 | |
VMware Player | =1.0.2 | |
VMware VMware Workstation | =5.5.6 | |
VMware ESX | =3.2 | |
VMware Workstation | =6.0 | |
VMware VMware Workstation | =5.5.5 | |
VMware Workstation | =5.5.3 | |
VMware Player | =1.0.3 | |
VMware VMware Workstation | =5.5.0 | |
VMware Player | =2.0.3 | |
VMware ESXi | =3.5 | |
VMware Player | =1.0.1 | |
VMware Server | =1.0.4 | |
VMware Player | =1.0.4 | |
VMware VMware Workstation | =6.0.2 | |
VMware ESX | =2.5.5 | |
VMware ESX | =3.1 | |
VMware Player | =1.0.5 | |
VMware ESX | =3.5 | |
VMware Server | =1.0.0 | |
VMware VMware Workstation | =5.5.2 | |
VMware Workstation | =5.5.1 | |
VMware Server | =1.0.3 | |
VMware Server | =1.0.2 | |
VMware Server | =1.0.5 | |
VMware Player | =2.0 | |
VMware VMware Workstation | =6.0.3 | |
VMware VMware Workstation | =6.0.1 | |
VMware Workstation | =5.5.4 | |
VMware Player | =1.0.0 | |
VMware ESX | =3.0.0 | |
VMware ESX | =3.0.2 | |
VMware ESX | =3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-0967 is rated as medium due to the potential for local privilege escalation.
To fix CVE-2008-0967, update your VMware products to versions that have incorporated the patch for this vulnerability.
CVE-2008-0967 affects VMware Workstation 5.x, Player 1.x, Server 1.x, and certain ESX versions before their respective patched releases.
The impact of CVE-2008-0967 allows an attacker to exploit the untrusted search path to execute arbitrary code with elevated privileges.
A temporary workaround for CVE-2008-0967 includes adjusting system path variables to limit the search path that VMware applications utilize.