Get a Pentest and security assessment of your IT network.

Advisories

VMware Security Advisory 2009-0009

VMware Security Advisory – A vulnerability in the udev program did not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space. Sudo versions 1.6.9p17 through 1.6.9p19 do not properly interpret a system group in the sudoers file during authorization decisions for a user who belongs to that group, which might allow local users to leverage an applicable sudoers file and gain root privileges by using a sudo command. The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to trigger arbitrary requests to intranet servers, read or overwrite arbitrary files by using a redirect to a file: URL, or execute arbitrary commands by using a redirect to an scp: URL.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/79128/VMSA-2009-0009.txt

Source: https://packetstormsecurity.com/files/79128/VMware-Security-Advisory-2009-0009.html

Related posts
Advisories

Secunia Security Advisory 35516

Advisories

Secunia Security Advisory 38533

Advisories

Secunia Security Advisory 41538

Advisories

CSIS2005-1.txt