CVE-2015-3650 - Improper Access Control

Severity

72%

Complexity

39%

Confidentiality

165%

vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.

vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

Type

VMWare

First reported 9 years ago

2015-07-10 17:59:00

Last updated 8 years ago

2016-12-28 02:59:00

Affected Software

VMWare Player 5.0

5.0

VMWare Player 5.0.1

5.0.1

VMWare Player 5.0.2

5.0.2

VMWare Player 7.0

7.0

VMWare Player 7.1

7.1

VMWare Workstation 10.0

10.0

VMWare Workstation 10.0.1

10.0.1

VMWare Workstation 10.0.2

10.0.2

VMWare Workstation 10.0.3

10.0.3

VMWare Workstation 11.0

11.0

VMWare Workstation 11.1

11.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.