First published: Thu Dec 29 2016(Updated: )
VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Fusion Pro | =8.0.0 | |
VMware Fusion Pro | =8.0.1 | |
VMware Fusion Pro | =8.0.2 | |
VMware Fusion Pro | =8.1.0 | |
VMware Fusion Pro | =8.1.1 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5329 is classified as a medium severity vulnerability.
To fix CVE-2016-5329, update VMware Fusion to version 8.5 or later.
CVE-2016-5329 allows local users to determine kernel memory addresses and bypass the kASLR protection.
CVE-2016-5329 affects VMware Fusion versions 8.0.0, 8.0.1, 8.0.2, 8.1.0, and 8.1.1.
CVE-2016-5329 is exploitable when System Integrity Protection (SIP) is enabled on OS X.