Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

VMSA-2013-0002 VMware ESX, Workstation, Fusion, and View VMCI privilege escalation vulnerability

Information

Severity

Severity

High

Family

Family

VMware Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

11 years ago

Modified

Modified

5 years ago

Summary

The remote ESXi is missing one or more security related Updates from VMSA-2013-0002.

Insight

Insight

VMware ESX, Workstation, Fusion, and View address a vulnerability in the VMCI.SYS driver which could result in a privilege escalation on Windows-based hosts and on Windows-based Guest Operating Systems. Relevant releases VMware Workstation 9.0 VMware Workstation 8.x prior to version 8.0.5 VMware Fusion 5.x prior to version 5.0.2 VMware Fusion 4.x prior to version 4.1.4 VMware View 5.x prior to version 5.1.2 VMware View 4.x prior to version 4.6.2 VMware ESXi 5.1 without ESXi510-201212102-SG VMware ESXi 5.0 without ESXi500-201212102-SG VMware ESXi 4.1.without ESXi410-201211402-BG VMware ESXi 4.0 without ESXi400-201302402-SG VMware ESX 4.1.without ESX410-201211401-SG VMware ESX 4.0 without ESX400-201302401-SG Problem Description a. VMware VMCI privilege escalation VMware ESX, Workstation, Fusion, and View contain a vulnerability in the handling of control code in vmci.sys. A local malicious user may exploit this vulnerability to manipulate the memory allocation through the Virtual Machine Communication Interface (VMCI) code. This could result in a privilege escalation on Windows-based hosts and on Windows-based Guest Operating Systems. The vulnerability does not allow for privilege escalation from the Guest Operating System to the host (and vice versa). This means that host memory can not be manipulated from the Guest Operating System (and vice versa). Systems that have VMCI disabled are also affected by this issue. Solution Apply the missing patch(es).

Common Vulnerabilities and Exposures (CVE)