Skip to main content

CVE-2009-1142: n/a in n/a

Medium
VulnerabilityCVE-2009-1142cvecve-2009-1142n-acwe-59
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

AI-Powered Analysis

AILast updated: 06/24/2025, 17:06:18 UTC

Technical Analysis

CVE-2009-1142 is a local privilege escalation vulnerability affecting the open-vm-tools package, specifically version 2009.03.18-154848. The vulnerability arises due to a symlink attack vector targeting temporary files in the /tmp directory when the vmware-user-suid-wrapper binary is setuid root and the ChmodChownDirectory function is enabled. This function is responsible for changing ownership and permissions of directories and files, and when improperly handled, it allows a local attacker to create symbolic links that redirect these operations to arbitrary files. By exploiting this, an attacker with local access can escalate privileges to root by manipulating file ownership and permissions, potentially compromising system confidentiality, integrity, and availability. The vulnerability is classified under CWE-59 (Improper Link Resolution Before File Access), indicating a failure to securely handle symbolic links. The CVSS v3.1 base score is 6.7 (medium severity), reflecting that the attack requires local access with high privileges but no user interaction, and can lead to full system compromise. No known public exploits are reported in the wild, and no patches are explicitly linked in the provided data, suggesting that mitigation may require manual configuration changes or updates from open-vm-tools maintainers. This vulnerability is particularly relevant in environments where open-vm-tools is deployed on Linux virtual machines managed by VMware, especially if the vmware-user-suid-wrapper is configured with setuid root privileges and the vulnerable function is enabled.

Potential Impact

For European organizations, the impact of CVE-2009-1142 can be significant in environments utilizing VMware virtualization with open-vm-tools installed on Linux guests. Successful exploitation allows local users—potentially low-privileged or compromised accounts—to escalate privileges to root, enabling full control over the virtual machine. This can lead to unauthorized access to sensitive data, disruption of critical services, and the potential for lateral movement within the network. Organizations relying on virtualized infrastructure for critical workloads, including financial institutions, healthcare providers, and government agencies, may face confidentiality breaches and operational disruptions. Additionally, compromised virtual machines could be used as footholds for further attacks against the host or other network segments. The vulnerability's reliance on local access limits remote exploitation but does not eliminate risk, especially in multi-tenant or shared environments where multiple users have shell access. Given the age of the vulnerability, some legacy systems may remain unpatched, increasing exposure. The absence of known exploits in the wild reduces immediate risk but does not preclude targeted attacks or future exploit development.

Mitigation Recommendations

To mitigate CVE-2009-1142, European organizations should: 1) Audit all Linux virtual machines running open-vm-tools to identify if vmware-user-suid-wrapper is setuid root and whether the ChmodChownDirectory function is enabled. 2) Remove the setuid bit from vmware-user-suid-wrapper unless absolutely necessary, as this reduces the attack surface by preventing privilege escalation via this binary. 3) Apply the latest open-vm-tools updates or patches from VMware or the open-vm-tools project that address this vulnerability; if no official patch exists, consider upgrading to a more recent, secure version. 4) Implement strict access controls and monitoring on /tmp directories to detect and prevent unauthorized symlink creation, including mounting /tmp with the 'noexec' and 'nosuid' options where feasible. 5) Employ host-based intrusion detection systems (HIDS) to monitor for suspicious file system changes and privilege escalations. 6) Limit local user access to virtual machines, especially in multi-tenant environments, and enforce the principle of least privilege. 7) Conduct regular security audits and vulnerability scans focusing on virtualization infrastructure and guest OS configurations. These steps go beyond generic advice by focusing on configuration hardening specific to the vulnerable components and operational practices that reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2009-03-25T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefb52

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 5:06:18 PM

Last updated: 8/11/2025, 12:25:22 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats