Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-34058

Опубликовано: 27 окт. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.1

Описание

VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

2:12.3.5-1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

released

2:11.0.5-4ubuntu0.18.04.3+esm3
esm-infra/focal

not-affected

2:11.3.0-2ubuntu0~ubuntu20.04.7
esm-infra/xenial

released

2:10.2.0-3~ubuntu0.16.04.1+esm4
focal

released

2:11.3.0-2ubuntu0~ubuntu20.04.7
jammy

released

2:12.1.5-3~ubuntu0.22.04.4
lunar

released

2:12.1.5-3ubuntu0.23.04.3
mantic

released

2:12.3.0-1ubuntu0.1

Показывать по

EPSS

Процентиль: 14%
0.00045
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 1 года назад

VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .

CVSS3: 7.1
nvd
больше 1 года назад

VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .

CVSS3: 7.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.1
debian
больше 1 года назад

VMware Tools contains a SAML token signature bypass vulnerability.A ma ...

CVSS3: 7.5
github
больше 1 года назад

VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .

EPSS

Процентиль: 14%
0.00045
Низкий

7.1 High

CVSS3

Уязвимость CVE-2023-34058