Описание
VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.0.8 (включая)
Одновременно
Одно из
cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:10.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:10.0.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
Одно из
cpe:2.3:a:vmware:tools:9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.10:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.11:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.12:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.13:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.17:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.10:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.11:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.12:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.10.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.10.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
EPSS
Процентиль: 15%
0.00047
Низкий
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-200
Связанные уязвимости
CVSS3: 5.5
github
больше 3 лет назад
VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
EPSS
Процентиль: 15%
0.00047
Низкий
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-200