Check Point Advisories

IPS-1 Protection for VMWare DHCP Vulnerability (DHCP Version 7)

Check Point Reference: CPAI-2007-203
Date Published: 27 Sep 2007
Severity: High
Last Updated: Thursday 27 September, 2007
Source: Secunia Advisory 26890
Industry Reference:CVE-2007-0063
Protection Provided by:
Who is Vulnerable?
  • EMC VMWare ACE 1 prior to 1.0.4
  • EMC VMWare ACE 2 prior to 2.0.1
  • EMC VMWare Player 1 prior to 1.0.5
  • EMC VMWare Player 2 prior to 2.0.1
  • EMC VMWare Server 1 Prior to 1.0.4
  • EMC VMWare Workstation 6 prior to 6.0.1
  • EMC VMWare Workstation 5 prior to 5.5.5
Vulnerability Description A vulnerability exists in the EMC VMWare DHCP service.  The service fails to properly parse UDP payloads and as a result can be exploited for arbitrary code execution.
Update/Patch AvaliablePatched versions of all products are available; update to the latest version of the appropriate VMWare product.

 

Vulnerability Details

The DHCP service provided by the VMWare host machine is used to assign IP addresses to hosts on a Virtual network.  This service contains a vulnerability that is observed when processing UDP datagrams.  If a UDP datagram destined for the DHCP service contains a malformed/incomplete header, an erroneous payload size calculation triggers an integer underflow.  This results in an extremely large value for the payload size that can overrun an internal UDP payload destination buffer.

Successful exploitation of this vulnerability can result in arbitrary code execution on the host machine, and granted root (Unix workstations) or SYSTEM (Windows) privilege.

It is observed that although it is theoretically possible, under certain host routing constraints, to trigger the underflow from outside of the virtual host network, it is probable that code execution is not likely, due to additional data appended to the request.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK