Executive Summary

Summary
Title VMware ESXi, Workstation, Player, and Fusion updates address important guest privilege escalation vulnerability
Informations
Name VMSA-2016-0001 First vendor Publication 2016-01-07
Vendor VMware Last vendor Modification 2016-01-07
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score 6.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Important Windows-based guest privilege escalation in VMware Tools

A kernel memory corruption vulnerability is present in the VMware Tools "Shared Folders" (HGFS) feature running on Microsoft Windows. Successful exploitation of this issue could lead to an escalation of privilege in the guest operating system.

VMware would like to thank Dmitry Janushkevich from the Secunia Research Team for reporting this issue to us.

Note: This vulnerability does not allow for privilege escalation from the guest operating system to the host. Host memory can not be manipulated from the guest operating system by exploiting this flaw.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-6933 to this issue.

Workarounds Removing the "Shared Folders" (HGFS) feature from previously installed VMware Tools will remove the possibility of exploitation.

Original Source

Url : http://www.vmware.com/security/advisories/VMSA-2016-0001.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-284 Access Control (Authorization) Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 3
Application 3
Os 7

Nessus® Vulnerability Scanner

Date Description
2016-01-15 Name : The remote VMware ESXi 5.0 host is affected by a guest privilege escalation v...
File : vmware_esxi_5_0_build_3086167_remote.nasl - Type : ACT_GATHER_INFO
2016-01-15 Name : The remote VMware ESXi 5.1 host is affected by a guest privilege escalation v...
File : vmware_esxi_5_1_build_3070626_remote.nasl - Type : ACT_GATHER_INFO
2016-01-15 Name : The remote VMware ESXi 5.5 host is affected by a guest privilege escalation v...
File : vmware_esxi_5_5_build_3248547_remote.nasl - Type : ACT_GATHER_INFO
2016-01-15 Name : The remote VMware ESXi 6.0 host is affected by a guest privilege escalation v...
File : vmware_esxi_6_0_build_3380124_remote.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : A virtualization application installed on the remote Mac OS X host is affecte...
File : macosx_fusion_vmsa_2016_0001.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : A virtualization application installed on the remote host is affected by a gu...
File : vmware_player_linux_vmsa_2016_0001.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : A virtualization application installed on the remote host is affected by a gu...
File : vmware_player_priv_esc_vmsa_2016_0001.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : A virtualization application installed on the remote host is affected by a gu...
File : vmware_workstation_linux_vmsa_2016_0001.nasl - Type : ACT_GATHER_INFO
2016-01-14 Name : A virtualization application installed on the remote host is affected by a gu...
File : vmware_workstation_priv_esc_vmsa_2016_0001.nasl - Type : ACT_GATHER_INFO
2016-01-13 Name : The remote VMware ESXi host is missing a security-related patch.
File : vmware_VMSA-2016-0001.nasl - Type : ACT_GATHER_INFO
2016-01-08 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2016-0001.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2016-01-20 21:26:13
  • Multiple Updates
2016-01-20 13:28:16
  • Multiple Updates
2016-01-18 00:27:26
  • Multiple Updates
2016-01-18 00:23:17
  • First insertion