{"id":"USN-6463-1","summary":"open-vm-tools vulnerabilities","details":"It was discovered that Open VM Tools incorrectly handled SAML tokens. A\nremote attacker Guest Operations privileges could possibly use this issue\nto escalate privileges. (CVE-2023-34058)\n\nMatthias Gerstner discovered that Open VM Tools incorrectly handled file\ndescriptors when dropping privileges. A local attacker could possibly use\nthis issue to hijack /dev/uinput and simulate user inputs. (CVE-2023-34059)\n","modified":"2026-04-22T10:41:01.733404Z","published":"2023-10-31T14:47:07Z","related":["UBUNTU-CVE-2023-34058","UBUNTU-CVE-2023-34059"],"upstream":["CVE-2023-34058","CVE-2023-34059","UBUNTU-CVE-2023-34058","UBUNTU-CVE-2023-34059"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6463-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34058"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34059"}],"affected":[{"package":{"name":"open-vm-tools","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/open-vm-tools@2:11.3.0-2ubuntu0~ubuntu20.04.7?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:11.3.0-2ubuntu0~ubuntu20.04.7"}]}],"versions":["2:10.3.10-3ubuntu1","2:11.0.1-2","2:11.0.1-3","2:11.0.1-3ubuntu1","2:11.0.1-4","2:11.0.5-1","2:11.0.5-2","2:11.0.5-3","2:11.0.5-4","2:11.1.0-2~ubuntu20.04.1","2:11.1.5-1~ubuntu20.04.2","2:11.2.5-2ubuntu1~ubuntu20.04.1","2:11.3.0-2ubuntu0~ubuntu20.04.1","2:11.3.0-2ubuntu0~ubuntu20.04.2","2:11.3.0-2ubuntu0~ubuntu20.04.3","2:11.3.0-2ubuntu0~ubuntu20.04.4","2:11.3.0-2ubuntu0~ubuntu20.04.5","2:11.3.0-2ubuntu0~ubuntu20.04.6"],"ecosystem_specific":{"binaries":[{"binary_version":"2:11.3.0-2ubuntu0~ubuntu20.04.7","binary_name":"open-vm-tools"},{"binary_version":"2:11.3.0-2ubuntu0~ubuntu20.04.7","binary_name":"open-vm-tools-desktop"},{"binary_version":"2:11.3.0-2ubuntu0~ubuntu20.04.7","binary_name":"open-vm-tools-sdmp"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6463-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2023-34058","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-34059","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"open-vm-tools","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/open-vm-tools@2:12.1.5-3~ubuntu0.22.04.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:12.1.5-3~ubuntu0.22.04.4"}]}],"versions":["2:11.3.0-2ubuntu1","2:11.3.0-2ubuntu2","2:11.3.5-1","2:11.3.5-1ubuntu2","2:11.3.5-1ubuntu3","2:11.3.5-1ubuntu4","2:11.3.5-1ubuntu4.1","2:12.1.0-1~ubuntu0.22.04.1","2:12.1.5-3~ubuntu0.22.04.1","2:12.1.5-3~ubuntu0.22.04.2","2:12.1.5-3~ubuntu0.22.04.3"],"ecosystem_specific":{"binaries":[{"binary_version":"2:12.1.5-3~ubuntu0.22.04.4","binary_name":"open-vm-tools"},{"binary_version":"2:12.1.5-3~ubuntu0.22.04.4","binary_name":"open-vm-tools-containerinfo"},{"binary_version":"2:12.1.5-3~ubuntu0.22.04.4","binary_name":"open-vm-tools-desktop"},{"binary_version":"2:12.1.5-3~ubuntu0.22.04.4","binary_name":"open-vm-tools-salt-minion"},{"binary_version":"2:12.1.5-3~ubuntu0.22.04.4","binary_name":"open-vm-tools-sdmp"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6463-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2023-34058","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-34059","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}