First published: Sat Aug 24 2013(Updated: )
vmware-mount in VMware Workstation 8.x and 9.x and VMware Player 4.x and 5.x, on systems based on Debian GNU/Linux, allows host OS users to gain host OS privileges via a crafted lsb_release binary in a directory in the PATH, related to use of the popen library function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | =8.0 | |
VMware Workstation | =8.0.0.18997 | |
VMware Workstation | =8.0.1 | |
VMware Workstation | =8.0.1.27038 | |
VMware Workstation | =8.0.2 | |
VMware Workstation | =8.0.3 | |
VMware Workstation | =8.0.4 | |
VMware Workstation | =8.0.5 | |
VMware Workstation | =8.0.6 | |
VMware Workstation | =9.0 | |
VMware Workstation | =9.0.1 | |
VMware Workstation | =9.0.2 | |
VMware Player | =4.0 | |
VMware Player | =4.0.0.18997 | |
VMware Player | =4.0.1 | |
VMware Player | =4.0.2 | |
VMware Player | =4.0.3 | |
VMware Player | =4.0.4 | |
VMware Player | =4.0.5 | |
VMware Player | =4.0.6 | |
VMware Player | =5.0 | |
VMware Player | =5.0.1 | |
VMware Player | =5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1662 has been classified as a moderate vulnerability, allowing privilege escalation on affected systems.
To mitigate CVE-2013-1662, you should update your VMware Workstation or Player to the latest version that contains the security patches.
CVE-2013-1662 affects VMware Workstation 8.x and 9.x, as well as VMware Player 4.x and 5.x on Debian GNU/Linux systems.
CVE-2013-1662 allows local users to gain host OS privileges through a crafted lsb_release binary.
A potential workaround for CVE-2013-1662 is to remove or restrict permissions on the lsb_release binary in the PATH.