VMware Fusion 6.x < 6.0.3 Windows 8.1 Guest Privilege Escalation (VMSA-2014-0005)

High Nessus Plugin ID 74263


The remote host has a virtualization application that is affected by a privilege escalation vulnerability.


The version of VMware Fusion installed on the remote Mac OS X host is version 6.x prior to 6.0.3. It is, therefore, reportedly affected by a privilege escalation vulnerability.

A kernel NULL dereference flaw exists in VMware tools on Windows 8.1 guest hosts. An attacker could escalate his privileges on the guest host.

Note that successful exploitation of the vulnerability does not allow privilege escalation from the guest host to the host system.


Upgrade to VMware Fusion 6.0.3 or later.

See Also


Plugin Details

Severity: High

ID: 74263

File Name: macosx_fusion_vmsa_2014_0005.nasl

Version: $Revision: 1.5 $

Type: local

Agent: macosx

Published: 2014/06/02

Modified: 2016/11/28

Dependencies: 50828

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:fusion

Required KB Items: Host/local_checks_enabled, MacOSX/Fusion/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/04/17

Vulnerability Publication Date: 2014/05/29

Reference Information

CVE: CVE-2014-3793

BID: 67737

OSVDB: 107561

VMSA: 2014-0005