Vulnerability Description
vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Player | 5.0 |
| Vmware | Workstation | 10.0 |
| Vmware | Horizon View Client | 5.4 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1032822
- http://www.securitytracker.com/id/1032823
- http://www.vmware.com/security/advisories/VMSA-2015-0005.htmlPatchVendor Advisory
- https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/
- http://www.securitytracker.com/id/1032822
- http://www.securitytracker.com/id/1032823
- http://www.vmware.com/security/advisories/VMSA-2015-0005.htmlPatchVendor Advisory
- https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/
FAQ
What is CVE-2015-3650?
CVE-2015-3650 is a vulnerability with a CVSS score of 7.2 (HIGH). vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before...
How severe is CVE-2015-3650?
CVE-2015-3650 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3650?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Player, Vmware Workstation, Vmware Horizon View Client.