Vulnerability Note VU#856689
VMware NAT Service vulnerable to buffer overflow via FTP PORT/EPRT commands
The VMware NAT Service used in multiple VMware products contains a buffer overflow in the way it handles FTP PORT and EPRT commands. An attacker could execute arbitrary code with the privileges of the NAT service or cause a denial of service.
VMware virtualization software provides Network Address Translation (NAT) for guest systems to access networks. The VMware NAT Service does not adequately validate parameters to the PORT and EPRT commands. As a result, specially crafted PORT or EPRT commands can trigger a buffer overflow. VMware Workstation, GSX Server, ACE, and Player products for Windows, Linux, and Solaris host platforms are affected. Additional information is available in VMware Knowledge Base Answer ID 2000.
To exploit this vulnerability, an attacker would need to convince a user to run code provided by the attacker on a VMware guest/virtual system. The attacker could then cross the boundary of the guest system and run arbitrary code within the context of the NAT process on the VMware host system. This attack vector may be of particular concern to users who intentionally run untrusted code in VMware environments. An attacker could also exploit this vulnerability remotely if the VMware NAT Service is configured to forward connections to guest/virtual systems. By default, the VMware NAT Service is not configured to forward connections, and in either scenario it may be necessary for the attacker to connect to an FTP server in order to issue crafted PORT or EPRT commands.
An attacker could execute arbitrary code with the privileges of the VMware NAT Service (Local System on Windows platforms, root on Linux platforms) or cause a denial of service.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|VMware||Affected||-||21 Dec 2005|
CVSS Metrics (Learn More)
This vulnerability was reported by Tim Shelton.
This document was written by Art Manion.
- CVE IDs: CVE-2005-4459
- Date Public: 21 Dec 2005
- Date First Published: 21 Dec 2005
- Date Last Updated: 23 Dec 2005
- Severity Metric: 4.36
- Document Revision: 24
If you have feedback, comments, or additional information about this vulnerability, please send us email.