This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the parsing of shader bytecode. By manipulating a document's elements, an attacker can trigger a read past the end of an allocated array. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the hypervisor.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-7195 is classified as high due to the potential for sensitive information disclosure.
To fix ZDI-CAN-7195, update VMware Workstation to the latest version provided by VMware.
ZDI-CAN-7195 is caused by improper handling of sensitive information within VMware Workstation.
ZDI-CAN-7195 affects users of VMware Workstation who have low-privileged code execution capabilities on their guest systems.
No, ZDI-CAN-7195 requires local access to the affected system to be exploited.