CVE-2012-1518 Details

CVE-2012-1518

Published: 2012-04-17
Last Modified: 2017-12-29
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.3/10
Exploit Score 6.5/10
Access Vector Adjacent_network
Access Complexity Low
Authentication None
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:A/AC:L/Au:N/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:* Yes - -
References

http://osvdb.org/81163
http://secunia.com/advisories/48782
http://www.securityfocus.com/bid/53006
http://www.securitytracker.com/id?1026922
http://www.securitytracker.com/id?1026923
http://www.vmware.com/security/advisories/VMSA-2012-0007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745

CVE ID
CVE-2012-1518
Published
2012-04-17
Modified
2017-12-29
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-264

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.