Vulnerability Description
VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, accessing hardware components, and stopping the "VMware tools service" service. NOTE: exploitation is simplified via (1) weak file permissions (Users = Read & Execute) for %PROGRAMFILES%\VMware; and weak registry key permissions (access by Users) for (2) vmmouse, (3) vmscsi, (4) VMTools, (5) vmx_svga, and (6) vmxnet in HKLM\SYSTEM\CurrentControlSet\Services\; which allows local users to perform various privileged actions outside of the guest OS by executing certain files under %PROGRAMFILES%\VMware\VMware Tools, as demonstrated by (a) VMControlPanel.cpl and (b) vmwareservice.exe.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Workstation | 5.5.3_build_34685 |
Related Weaknesses (CWE)
References
- http://osvdb.org/45244
- http://securityreason.com/securityalert/2281
- http://www.securityfocus.com/archive/1/460664/100/0/threaded
- http://www.securityfocus.com/archive/1/461807/100/0/threaded
- http://osvdb.org/45244
- http://securityreason.com/securityalert/2281
- http://www.securityfocus.com/archive/1/460664/100/0/threaded
- http://www.securityfocus.com/archive/1/461807/100/0/threaded
FAQ
What is CVE-2007-1056?
CVE-2007-1056 is a vulnerability with a CVSS score of 7.2 (HIGH). VMware Workstation 5.5.3 build 34685 does not provide per-user restrictions on certain privileged actions, which allows local users to perform restricted operations such as changing system time, acces...
How severe is CVE-2007-1056?
CVE-2007-1056 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1056?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Workstation.