Lucene search

K
gentooGentoo FoundationGLSA-202210-27
HistoryOct 31, 2022 - 12:00 a.m.

open-vm-tools: Local Privilege Escalation

2022-10-3100:00:00
Gentoo Foundation
security.gentoo.org
45
open-vm-tools
privilege escalation
vmware
guest
unprivileged user
root privileges
upgrade
resolution
unix

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Background

open-vm-tools contains tools for VMware guests.

Description

A pipe accessible to unprivileged users in the VMWare guest does not sufficiently sanitize input.

Impact

An unprivileged guest user could achieve root privileges within the guest.

Workaround

There is no known workaround at this time.

Resolution

All open-vm-tools users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-emulation/open-vm-tools-12.1.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-emulation/open-vm-tools< 12.1.0UNKNOWN

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%