VMSA-2014-0005 : VMware Workstation, Player, Fusion, and ESXi patches address a guest privilege escalation

Medium Nessus Plugin ID 74244


The remote VMware ESXi host is missing a security-related patch.


a. Guest privilege escalation in VMware Tools

A kernel NULL dereference vulnerability was found in VMware Tools running on Microsoft Windows 8.1. Successful exploitation of this issue could lead to an escalation of privilege in the guest operating system.

VMware would like to thank Tavis Ormandy from the Google Security Team for reporting this issue to us.
The vulnerability does not allow for privilege escalation from the Guest Operating System to the host. This means that host memory can not be manipulated from the Guest Operating System.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-3793 to this issue.


Apply the missing patch.

See Also


Plugin Details

Severity: Medium

ID: 74244

File Name: vmware_VMSA-2014-0005.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2014/05/30

Modified: 2016/08/16

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.0, cpe:/o:vmware:esxi:5.1, cpe:/o:vmware:esxi:5.5

Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/05/29

Reference Information

CVE: CVE-2014-3793

BID: 67737

VMSA: 2014-0005

IAVB: 2014-B-0068, 2014-B-0069, 2014-B-0070