This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The virtualization application installed on the remote host is
affected by a privilege escalation vulnerability.
The version of VMware Workstation installed on the remote host is 10.x
prior to 10.0.7 or 11.x prior to 11.1.1. It is, therefore, affected by
a privilege escalation vulnerability due to a failure to provide a
valid discretionary access control list (DACL) pointer for the
printproxy.exe process. A local attacker, using thread injection, can
exploit this to gain elevated privileges or execute arbitrary code.
See also :
Upgrade to VMware Workstation version 10.0.7 / 11.1.1 or later.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false