First published: Thu Dec 29 2016(Updated: )
VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Tools | <=10.0.8 | |
VMware Tools | =10.0.0 | |
VMware Tools | =10.0.5 | |
VMware Tools | =10.0.6 | |
Apple Mac OS X | ||
VMware Tools | =9.0.0 | |
VMware Tools | =9.0.1 | |
VMware Tools | =9.0.5 | |
VMware Tools | =9.0.10 | |
VMware Tools | =9.0.11 | |
VMware Tools | =9.0.12 | |
VMware Tools | =9.0.13 | |
VMware Tools | =9.0.15 | |
VMware Tools | =9.0.16 | |
VMware Tools | =9.0.17 | |
VMware Tools | =9.4.0 | |
VMware Tools | =9.4.5 | |
VMware Tools | =9.4.10 | |
VMware Tools | =9.4.11 | |
VMware Tools | =9.4.12 | |
VMware Tools | =9.4.15 | |
VMware Tools | =9.10.0 | |
VMware Tools | =9.10.1 | |
VMware Tools | =9.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.