A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector, a component of VMware Tools. This issue can be exploited by luring a victim into opening a document from the attacker's share. An attacker can exploit this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet.
This issue was successfully verified on VMware Tools for Windows version 10.0.5 build 3228253.
This issue has been fixed in VMware Tools for Windows version 10.0.6.
VMware Shared Folders is used to shared files between the guest & host operating system. VMware Host Guest Client Redirector is a component of VMware Tools that used to enabled Shared Folders in the guest operating system. Whenever a document is opened from a UNC path, the Client Redirector injects the DLL
vmhgfs.dll (VMware HGFS Provider) into the application that is opening the document. The DLL is loaded from a relative path, the UNC path is also search when this DLL is loaded into the application. This allows for DLL hijacking, which can be used by an attacker to run arbitrary code with the privileges of the user that is opening the document from the share, potentially resulting in a full compromise of the affected system.
When the Client Redirector loads the
vmhgfs.dll DLL, it searches the Registry for its path. The path is stored in the Registry key
HKLM\SYSTEM\ControlSet001\services\vmhgfs\networkprovider\ProviderPath. A relative path is used, which causes
Windows to search for the DLL using the Dynamic-Link Library Search Order - including the current working directory.
Figure 1: relative
An attacker can exploit this issue by creating a network share (SMB or WebDAV) containing a
System32 folder with a specially crafted
vmhgfs.dll DLL. Luring a victim into opening a normal document (eg,
vmhgfs.dll loaded from UNC path