Critical VMware Security Alert for Windows-Hosted VMware Workstation, VMware Player, and VMware ACE (1004034)
The issue described in this Security Alert has been remediated by VMware. Please see VMSA-0008-0005 for patch information.
Windows-hosted versions of:
VMware Workstation 6.0.2 and earlier
VMware Workstation 5.5.4 and earlier
VMware Player 2.0.2 and earlier
VMware Player 1.0.4 and earlier
VMware ACE 2.0.2 and earlier
- VMware ACE 1.0.2 and earlier
If you are running a newer product version, this alert does not apply to your product.
VMware Server is not affected because it does not use shared folders.
No versions of ESX Server, including ESX Server 3i, are affected by this vulnerability. Because ESX Server is based on a bare-metal hypervisor architecture, not a hosted architecture, it does not include any shared folder abilities.
VMware Fusion and Linux-hosted VMware products are unaffected.
To improve user inter-operation with virtualized systems VMware's software implements a number of inter-system communication features. The Shared Folder mechanism is one of such feature.
VMware's shared folders allow users to transfer data between a virtualized system (Guest) and the non-virtualized Host system that contains it. This form of data transfer is available to users of the Guest system through read and write access to filesystem folders shared by both Guest and Host systems. To maintain effective isolation between Guest and Host systems, this mechanism should limit access from the Guest only to the Host system's folders that are selected for sharing with the virtualized guests.
A vulnerability was found in VMware's shared folders mechanism that grants users of a Guest system read and write access to any portion of the Host's file system including the system folder and other security-sensitive files. Exploitation of this vulnerability allows attackers to break out of an isolated Guest system to compromise the underlying Host system that controls it.
By default, the shared folders feature is disabled in Workstation 6, Player 2, and ACE 2. In order to exploit this vulnerability, the virtual machine must have the shared folders feature manually enabled and at least one folder configured for sharing between the host and guest. Given the requirements of the vulnerability, it cannot be exploited by default in Workstation 6, Player 2, and ACE 2.
Workstation 5, Player 1, and ACE 1 enable the shared folders feature by default, but exploiting this vulnerability still requires at least one folder to be configured as shared between the host and guest. Given the requirements of the vulnerability, it cannot be exploited by default in Workstation 5, Player 1, and ACE 1.
The issue affects the Windows-hosted versions of VMware Workstation, ACE, and Player that are listed above. The issue does not affect VMware ESX Server or VMware Desktop Infrastructure products. There have been no reports of this issue occurring in customer environments.
If an updated product version cannot be installed, users of affected Windows-hosted VMware products should disable shared folders.
To disable shared folders in the Global settings:
- From the VMware product's menu, choose Edit > Preferences.
- In the Workspace tab, under Virtual Machines, deselect the checkbox for Enable all shared folders by default.
To disable shared folders for the individual virtual machine settings:
- From the VMware product's menu, choose VM > Settings.
- In the Options tab, select Shared Folders and Disable.