Knowledge Base

The VMware Knowledge Base provides support solutions, error messages and troubleshooting guides
 
Search the VMware Knowledge Base (KB)   View by Article ID
 

Security Response to CAN-2005-0444: Vulnerability When GSX Server or Workstation Searches for gdk-pixbuf Library Not Installed on Host (1588)

Details

A security software audit warns that my GSX Server or Workstation host may have the security vulnerability described at:
www.gentoo.org/security/en/glsa/glsa-200502-18.xml
secunia.com/advisories/14291/
www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0444 (CAN-2005-0444)

How can I protect my host? Does VMware have a fix for this?

Solution

A vulnerability has been discovered in VMware Workstation and GSX Server on Linux hosts, which can be exploited by malicious, local users to gain escalated privileges.

The vulnerability occurs when Workstation or GSX Server searches for gdk-pixbuf modules in an untrusted, world-writable directory and gdk-pixbuf is not installed on the host. This can be exploited via a malicious module to execute arbitrary code with the privileges of the user running Workstation or GSX Server.

The vulnerability has been confirmed in Workstation 4.x and GSX Server 3.0 and 3.1.

To work around the issue, install gdk-pixbuf on the host. The library is available with your Linux distribution.

This vulnerability has been addressed and fixed with the release of Workstation 5 and GSX Server 3.2.

VMware wishes to thank Tavis Ormandy (taviso@gentoo.org) for discovering and reporting this vulnerability.

For links to other VMware security articles, refer to www.vmware.com/support/kb/enduser/std_adp.php? p_faqid=1107.

Keywords

secunia; urlz; 1588; alertz; gsx320

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 0 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.
What can we do to improve this information? (4000 or fewer characters)
  • 0 Ratings
Actions
KB: