VMware Tools 9.x / 10.x < 10.1.0 Kernel Memory Address Disclosure (VMSA-2016-0017) (Mac OS X)

medium Nessus Plugin ID 94339

Synopsis

A virtualization application installed on the remote macOS or Mac OS X host is affected by an information disclosure vulnerability.

Description

The version of VMware Tools installed on the remote macOS or Mac OS X host is 9.x or 10.x prior to 10.1.0. It is, therefore, affected by an information disclosure vulnerability in the System Integrity Protection (SIP) feature. A local attacker can exploit this issue to obtain kernel memory addresses and thereby bypass the kASLR protection mechanism.

Solution

Upgrade to VMware Tools version 10.1.0 or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2016-0017.html

Plugin Details

Severity: Medium

ID: 94339

File Name: macosx_vmware_tools_vmsa_2016_0017.nasl

Version: 1.7

Type: local

Agent: macosx

Published: 10/27/2016

Updated: 11/14/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2016-5328

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:tools

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, installed_sw/VMware Tools

Exploit Ease: No known exploits are available

Patch Publication Date: 10/25/2016

Vulnerability Publication Date: 10/25/2016

Reference Information

CVE: CVE-2016-5328

BID: 93886

VMSA: 2016-0017