Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-3650


vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.


Published

2015-07-10T17:59:01.170

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.2 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-284

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application vmware player 5.0 Yes
Application vmware player 5.0.1 Yes
Application vmware player 5.0.2 Yes
Application vmware player 5.0.3 Yes
Application vmware player 5.0.4 Yes
Application vmware player 6.0 Yes
Application vmware player 6.0.1 Yes
Application vmware player 6.0.2 Yes
Application vmware player 6.0.3 Yes
Application vmware player 6.0.4 Yes
Application vmware player 6.0.5 Yes
Application vmware player 6.0.6 Yes
Application vmware player 7.0 Yes
Application vmware player 7.1 Yes
Application vmware workstation 10.0 Yes
Application vmware workstation 10.0.1 Yes
Application vmware workstation 10.0.2 Yes
Application vmware workstation 10.0.3 Yes
Application vmware workstation 10.0.4 Yes
Application vmware workstation 10.0.5 Yes
Application vmware workstation 10.0.6 Yes
Application vmware workstation 11.0 Yes
Application vmware workstation 11.1 Yes
Application vmware horizon_view_client 5.4 Yes
Application vmware horizon_view_client 5.4.1 Yes

References