Executive Summary

Informations
Name CVE-2013-1662 First vendor Publication 2013-08-23
Vendor Cve Last vendor Modification 2013-08-26

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

vmware-mount in VMware Workstation 8.x and 9.x and VMware Player 4.x and 5.x, on systems based on Debian GNU/Linux, allows host OS users to gain host OS privileges via a crafted lsb_release binary in a directory in the PATH, related to use of the popen library function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1662

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11
Application 12

Metasploit Database

id Description
2013-08-22 VMWare Setuid vmware-mount Unsafe popen(3)

Nessus® Vulnerability Scanner

Date Description
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2013-0010.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://www.vmware.com/security/advisories/VMSA-2013-0010.html
MISC http://blog.cmpxchg8b.com/2013/08/security-debianisms.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:24:26
  • Multiple Updates
2021-04-22 01:29:14
  • Multiple Updates
2020-05-23 13:17:02
  • Multiple Updates
2020-05-23 00:36:35
  • Multiple Updates
2013-08-27 09:19:14
  • Multiple Updates
2013-08-26 21:21:10
  • Multiple Updates
2013-08-24 13:18:59
  • First insertion