| Vulnerability Name: | CVE-2014-8370 (CCN-100933) |
| Assigned: | 2014-10-21 |
| Published: | 2015-01-27 |
| Updated: | 2017-09-08 |
| Summary: | VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.
|
| CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)| Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | | Scope: | Scope (S): Unchanged
| | Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): Low |
|
| CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)| Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): Partial | 6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P) 4.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)| Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): Partial |
|
| Vulnerability Type: | CWE-264
|
| Vulnerability Consequences: | Gain Privileges |
| References: | Source: MITRE Type: CNA CVE-2014-8370
Source: CCN Type: JVN#88252465 Arbitrary files may be overwritten in multiple VMware products
Source: JVN Type: Third Party Advisory, VDB Entry JVN#88252465
Source: JVNDB Type: Third Party Advisory, VDB Entry JVNDB-2015-000007
Source: CCN Type: Full Disclosure Mailing List, Tue, 27 Jan 2015 23:56:04 +0000 NEW VMSA-2015-0001 - VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
Source: SECUNIA Type: UNKNOWN 62551
Source: SECUNIA Type: UNKNOWN 62605
Source: SECUNIA Type: UNKNOWN 62669
Source: BID Type: Third Party Advisory, VDB Entry 72338
Source: CCN Type: BID-72338 Multiple VMware Products CVE-2014-8370 Remote Privilege Escalation Vulnerability
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1031642
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1031643
Source: CCN Type: VMware Security Advisory VMSA-2015-0001 VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues
Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/security/advisories/VMSA-2015-0001.html
Source: XF Type: UNKNOWN vmware-cve20148370-priv-esc(100933)
Source: XF Type: UNKNOWN vmware-cve20148370-priv-esc(100933)
|
| Vulnerable Configuration: | Configuration 1: cpe:/a:vmware:player:6.0:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.1:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.2:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.3:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.4:*:*:*:*:*:*:* Configuration 2: cpe:/a:vmware:fusion:6.0:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.1:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.2:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.3:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.4:*:*:*:*:*:*:* Configuration 3: cpe:/a:vmware:workstation:10.0:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.1:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.2:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.3:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.4:*:*:*:*:*:*:* Configuration 4: cpe:/o:vmware:esxi:5.0:*:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.0:1:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.0:2:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.1:*:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.1:1:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.5:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:vmware:esxi:5.0:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.1:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.1:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.2:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.2:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.3:*:*:*:*:*:*:*OR cpe:/a:vmware:workstation:10.0.4:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.1:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.3:*:*:*:*:*:*:*OR cpe:/a:vmware:fusion:6.0.4:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.2:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.3:*:*:*:*:*:*:*OR cpe:/a:vmware:player:6.0.4:*:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.5:*:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.1:1:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.1:*:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.0:2:*:*:*:*:*:*OR cpe:/o:vmware:esxi:5.0:1:*:*:*:*:*:*
Denotes that component is vulnerable |
| BACK |