Vigil@nce - VMware ESX, Player, Workstation : privilege escalation via lgtosync.sys
décembre 2013 par Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can corrupt the memory of lgtosync.sys of VMware
ESX, Player and Workstation, in order to escalate his privileges.
Impacted products : ESX, ESXi, VMware Player, VMware vSphere
Hypervisor, VMware Workstation
Severity : 2/4
Creation date : 04/12/2013
DESCRIPTION OF THE VULNERABILITY
The VMware ESX, Player and Workstation products install the
lgtosync.sys driver on guest systems of type Windows.
However, an attacker in the guest system can corrupt the memory of
this driver, in order to execute code with system privileges in
the guest system.
A local attacker can therefore corrupt the memory of lgtosync.sys
of VMware ESX, Player and Workstation, in order to escalate his
privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN