First published: Thu Dec 29 2016(Updated: )
VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Tools | <=10.0.8 | |
VMware Tools | =10.0.0 | |
VMware Tools | =10.0.5 | |
VMware Tools | =10.0.6 | |
Apple iOS and macOS | ||
VMware Tools | =9.0.0 | |
VMware Tools | =9.0.1 | |
VMware Tools | =9.0.5 | |
VMware Tools | =9.0.10 | |
VMware Tools | =9.0.11 | |
VMware Tools | =9.0.12 | |
VMware Tools | =9.0.13 | |
VMware Tools | =9.0.15 | |
VMware Tools | =9.0.16 | |
VMware Tools | =9.0.17 | |
VMware Tools | =9.4.0 | |
VMware Tools | =9.4.5 | |
VMware Tools | =9.4.10 | |
VMware Tools | =9.4.11 | |
VMware Tools | =9.4.12 | |
VMware Tools | =9.4.15 | |
VMware Tools | =9.10.0 | |
VMware Tools | =9.10.1 | |
VMware Tools | =9.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5328 is classified as a medium severity vulnerability.
To resolve CVE-2016-5328, update VMware Tools to version 10.1.0 or later.
CVE-2016-5328 affects VMware Tools versions 9.x and 10.x prior to 10.1.0.
CVE-2016-5328 exploits the presence of local users determining kernel memory addresses and bypassing kASLR protection.
If you are using VMware Tools versions 9.x or 10.x below 10.1.0, your system is vulnerable to CVE-2016-5328.