Privilege escalation vulnerability in VMware Workstation and VMware PlayerID: oval:org.secpod.oval:def:1984 | Date: (C)2011-08-17 (M)2021-09-30 |
Class: VULNERABILITY | Family: windows |
The host is installed with the VMware Workstation 7.1.x before 7.1.4 or VMware Player 3.1.x before 3.1.4 and is prone to privilege escalation vulnerability via a race condition. A flaw is present in the application, which allows an attacker to access the guestOS to mount the arbitrary directories and hence gain control of the mounted directory. Successful exploitation leads to unauthorized modification, information disclosure and denial of service conditions.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 2000 |
Microsoft Windows Server 2003 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Product: |
VMware Player |
VMware Workstation |