VMware Fusion 8.x < 8.5.0 Kernel Memory Address Disclosure (VMSA-2016-0017) (Mac OS X)

medium Nessus Plugin ID 94338

Synopsis

A virtualization application installed on the remote macOS or Mac OS X host is affected by an information disclosure vulnerability.

Description

The version of VMware Fusion installed on the remote macOS or Mac OS X host is 8.x prior to 8.5.0. It is, therefore, affected by an information disclosure vulnerability in the System Integrity Protection (SIP) feature. A local attacker can exploit this issue to obtain kernel memory addresses and thereby bypass the kASLR protection mechanism.

Solution

Upgrade to VMware Fusion version 8.5.0 or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2016-0017.html

Plugin Details

Severity: Medium

ID: 94338

File Name: macosx_fusion_vmsa_2016_0017.nasl

Version: 1.7

Type: local

Agent: macosx

Published: 10/27/2016

Updated: 11/14/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2016-5329

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:fusion

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, installed_sw/VMware Fusion

Exploit Ease: No known exploits are available

Patch Publication Date: 10/25/2016

Vulnerability Publication Date: 10/25/2016

Reference Information

CVE: CVE-2016-5329

BID: 93888

VMSA: 2016-0017