First published: Fri Jul 10 2015(Updated: )
vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Player | =5.0 | |
VMware Player | =5.0.1 | |
VMware Player | =5.0.2 | |
VMware Player | =5.0.3 | |
VMware Player | =5.0.4 | |
VMware Player | =6.0 | |
VMware Player | =6.0.1 | |
VMware Player | =6.0.2 | |
VMware Player | =6.0.3 | |
VMware Player | =6.0.4 | |
VMware Player | =6.0.5 | |
VMware Player | =6.0.6 | |
VMware Player | =7.0 | |
VMware Player | =7.1 | |
VMware Workstation and ESXi | =10.0 | |
VMware Workstation and ESXi | =10.0.1 | |
VMware Workstation and ESXi | =10.0.2 | |
VMware Workstation and ESXi | =10.0.3 | |
VMware Workstation and ESXi | =10.0.4 | |
VMware Workstation and ESXi | =10.0.5 | |
VMware Workstation and ESXi | =10.0.6 | |
VMware Workstation and ESXi | =11.0 | |
VMware Workstation and ESXi | =11.1 | |
VMware Horizon Client | =5.4 | |
VMware Horizon Client | =5.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3650 has a moderate severity rating due to its potential for local privilege escalation.
To fix CVE-2015-3650, update to the latest versions of VMware Workstation, Player, or Horizon Client as specified in the relevant security advisories.
CVE-2015-3650 affects VMware Workstation versions 7.x to 10.x, VMware Player versions 5.x to 6.x, and Horizon Client 5.x local-mode.
Currently, there are no known workarounds for CVE-2015-3650 aside from applying the available updates.
CVE-2015-3650 is classified as a local privilege escalation vulnerability in VMware products.