Your one-stop web resource providing safety and security information to manufacturers

A host privilege escalation vulnerability ended up fixed by VMware which issued updates for its Workstation, Player, and Horizon View Client for Windows.

Reported by Kyriakos Economou, vulnerability researcher at Nettitude, the bug (CVE-2015-3650) is the result of VMware Workstation, Player and Horizon View Client for Windows not setting a discretionary access control list (DACL) for one of their processes.

VMware Fixes Security Issues
Ubuntu Patches Linux Kernel Holes
Help Desk Software Needs Help
Trojan Invisible to AV

“This may allow a local attacker to elevate their privileges and execute code in the security context of the affected process,” VMware said in an advisory.

Affected product versions include VMware Workstation 11.x and 10.x, VMware Player 7.x and 6.x, and VMware Horizon Client for Windows (with Local Mode Option) 5.x.

Cyber Security

Pin It on Pinterest

Share This