First published: Fri Oct 16 2009(Updated: )
The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Fusion Pro | <=2.0.5 | |
VMware Fusion Pro | =1.0 | |
VMware Fusion Pro | =1.1 | |
VMware Fusion Pro | =1.1.1 | |
VMware Fusion Pro | =1.1.2 | |
VMware Fusion Pro | =1.1.3 | |
VMware Fusion Pro | =2.0 | |
VMware Fusion Pro | =2.0.1 | |
VMware Fusion Pro | =2.0.2 | |
VMware Fusion Pro | =2.0.3 | |
VMware Fusion Pro | =2.0.4 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3281 is rated as a high severity vulnerability due to the potential for privilege escalation on the host operating system.
To resolve CVE-2009-3281, update VMware Fusion to version 2.0.6 or later.
CVE-2009-3281 affects VMware Fusion versions up to 2.0.5 and includes versions 1.0, 1.1, 1.1.1, 1.1.2, 1.1.3, and specified 2.0.x versions.
Users of VMware Fusion versions prior to 2.0.6 on macOS are at risk from CVE-2009-3281.
CVE-2009-3281 is a local privilege escalation vulnerability caused by improper file permissions in the vmx86 kernel extension.