Computer Security
[EN] securityvulns.ru no-pyccku


VMWare applications privilege escalation
Published:14.07.2015
Source:
SecurityVulns ID:14589
Type:local
Threat Level:
5/10
Description:Weak executable file DACL.
Affected:VMWARE : VMware Workstation 11.1
 VMWARE : VMware Horizon Client 5.4
 VMWARE : VMware Player 7.1
CVE:CVE-2015-3650 (vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.)
Original documentdocumentVMWARE, NEW VMSA-2015-0005 : VMware Workstation, Player and Horizon View Client for Windows updates address a host privilege escalation vulnerability (14.07.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod