ID CVE-2014-3793
Summary VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors. Per http://cwe.mitre.org/data/definitions/476.html "CWE-476: NULL Pointer Dereference"
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*
    cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*
    cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*
    cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 09-10-2018 - 19:47)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:A/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bugtraq 20140530 NEW VMSA-2014-0005 - VMware Workstation, Player, Fusion, and ESXi patches address a guest privilege escalation
confirm http://www.vmware.com/security/advisories/VMSA-2014-0005.html
misc http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html
sectrack
  • 1030310
  • 1030311
secunia 58894
Last major update 09-10-2018 - 19:47
Published 31-05-2014 - 11:17
Last modified 09-10-2018 - 19:47
Back to Top