VMware Fusion 6.x < 6.0.3 Windows 8.1 Guest Privilege Escalation (VMSA-2014-0005)

medium Nessus Plugin ID 74263

Synopsis

The remote host has a virtualization application that is affected by a privilege escalation vulnerability.

Description

The version of VMware Fusion installed on the remote Mac OS X host is version 6.x prior to 6.0.3. It is, therefore, reportedly affected by a privilege escalation vulnerability.

A kernel NULL dereference flaw exists in VMware tools on Windows 8.1 guest hosts. An attacker could escalate his privileges on the guest host.

Note that successful exploitation of the vulnerability does not allow privilege escalation from the guest host to the host system.

Solution

Upgrade to VMware Fusion 6.0.3 or later.

See Also

http://www.nessus.org/u?bd08e50e

Plugin Details

Severity: Medium

ID: 74263

File Name: macosx_fusion_vmsa_2014_0005.nasl

Version: 1.7

Type: local

Agent: macosx

Published: 6/2/2014

Updated: 11/26/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-3793

Vulnerability Information

CPE: cpe:/a:vmware:fusion

Required KB Items: Host/local_checks_enabled, MacOSX/Fusion/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/17/2014

Vulnerability Publication Date: 5/29/2014

Reference Information

CVE: CVE-2014-3793

BID: 67737

VMSA: 2014-0005