Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

                       ESB-2005.1013 -- [Win][Linux]
VMware NAT Service vulnerable to buffer overflow via FTP PORT/EPRT commands
                             28 December 2005


        AusCERT Security Bulletin Summary

Product:           VMWare Workstation 5.5 and prior
                   VMWare GSX Server 3.2 and prior
                   VMWare ACE 1.0.1 and prior
                   VMWare Player 1.0 and prior
Publisher:         US-CERT
Operating System:  Windows
                   Linux variants
Impact:            Root Compromise
                   Administrator Compromise
                   Execute Arbitrary Code/Commands
Access:            Remote/Unauthenticated
CVE Names:         CVE-2005-4459

Original Bulletin: http://www.kb.cert.org/vuls/id/856689

- --------------------------BEGIN INCLUDED TEXT--------------------

US-CERT Vulnerability Note VU#856689

VMware NAT Service vulnerable to buffer overflow via FTP PORT/EPRT commands


   The VMware NAT Service used in multiple VMware products contains a buffer
   overflow in the way it handles FTP PORT and EPRT commands. An attacker
   could execute arbitrary code with the privileges of the NAT service or
   cause a denial of service.

I. Description

   VMware virtualization software provides Network Address Translation (NAT)
   for guest systems to access networks. The VMware NAT Service does not
   adequately validate parameters to the PORT and EPRT commands. As a result,
   specially crafted PORT or EPRT commands can trigger a buffer overflow.
   VMware Workstation, GSX Server, ACE, and Player products for Windows,
   Linux, and Solaris host platforms are affected. Additional information
   is available in VMware Knowledge Base Answer ID 2000.

   To exploit this vulnerability, an attacker would need to convince a user
   to run code provided by the attacker on a VMware guest/virtual system.
   The attacker could then cross the boundary of the guest system and run
   arbitrary code within the context of the NAT process on the VMware host
   system. This attack vector may be of particular concern to users who
   intentionally run untrusted code in VMware environments. An attacker
   could also exploit this vulnerability remotely if the VMware NAT Service
   is configured to forward connections to guest/virtual systems. By default,
   the VMware NAT Service is not configured to forward connections, and in
   either scenario it may be necessary for the attacker to connect to an
   FTP server in order to issue crafted PORT or EPRT commands.

II. Impact

   An attacker could execute arbitrary code with the privileges of the
   VMware NAT Service (Local System on Windows platforms, root on Linux
   platforms) or cause a denial of service.

III. Solution


   This vulnerability is addressed in:

       * VMware Workstation 5.5.1
       * VMware GSX Server 3.2.1
       * VMware ACE 1.0.2
       * VMware Player 1.0.1

   The latest releases of these products are available from the VMware
   Download Center.

Disable VMware NAT Service

   Disable the VMware NAT Service as described in VMware Knowledge Base
   Answer ID 2002.

Systems Affected

   Vendor	Status	    Date Updated
   VMware	Vulnerable	21-Dec-2005




   This vulnerability was reported by Tim Shelton.

This document was written by Art Manion.
Other Information
Date Public	12/21/2005
Date First Published	12/21/2005 05:26:43 PM
Date Last Updated	12/23/2005
CERT Advisory	 
CVE Name	CVE-2005-4459
Metric	4.36
Document Revision	24

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.

Comment: http://www.auscert.org.au/render.html?it=1967