VMware directory traversal and privilege escalation vulnerabilities
Description
Multiple VMware products contain two critical security vulnerabilities. The first vulnerability stems from improper exception code handling during page faults in guest operating systems, enabling authenticated users within a guest OS to escalate their privileges. The second vulnerability involves insufficient input validation that allows network-based attackers to perform directory traversal attacks, potentially accessing and downloading arbitrary files from the host system. These issues affect VMware Workstation (≤6.5.2), Player (≤2.5.2), ACE (≤2.5.2), Server (≤2.0.1 and ≤1.0.9), Fusion (≤2.0.5), ESXi (3.5, 4.0), and ESX (2.5.5, 3.0.3, 3.5, 4.0).
Remediation
Immediately apply the security patches provided in VMware Security Advisory VMSA-2009-0015 or upgrade to the following fixed versions:
- VMware Workstation 6.5.3 or later
- VMware Player 2.5.3 or later
- VMware ACE 2.5.3 or later
- VMware Server 2.0.2 or later
- VMware Fusion 2.0.6 or later
- VMware ESXi and ESX: Apply patches specified in VMSA-2009-0015
Implementation steps:
- Review the official VMware security advisory at https://www.vmware.com/security/advisories/VMSA-2009-0015.html
- Download the appropriate patches or updated versions for your VMware products
- Schedule maintenance windows for production systems to minimize disruption
- Create backups of virtual machines and configurations before applying updates
- Apply patches following VMware's installation procedures for your specific product
- Verify successful patch installation and test critical functionality
- As an additional security measure, restrict network access to VMware management interfaces using firewalls and implement network segmentation