Short Name |
HTTP:STC:ACTIVEX:VMWARE-FS |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
VMware Remote Console HOST and MOID Format String Code Execution |
Release Date |
2010/10/13 |
Update Number |
1791 |
Supported Platforms |
idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known code execution vulnerability in VMware Remote Console (VMrc). It is due to a format string error in the VMrc browser plug-in on Windows-based platforms. This can allow remote attackers to execute arbitrary code by enticing the target user to open a maliciously crafted HTML document. In a successful attack, where arbitrary code is injected and executed on the target host, the behavior of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the logged in user. In an unsuccessful attack, a denial-of-service condition can occur on the target system.
VMware Remote Console is prone to a remote format string vulnerability. Successful exploits may allow an attacker to execute arbitrary code. Failed attacks may cause denial-of-service conditions. NOTE: This issue was previously covered in BID 39345 (VMware Hosted Products VMSA-2010-0007 Multiple Remote and Local Vulnerabilities), but has been given its own record to better document it.