Back to Blog
Vmware fusion shared folders5/31/2023 ![]() This Security Advisory is posted to the following lists:Ĭonsolidated list of VMware Security AdvisoriesĬopyright 2016 VMware Inc. Į-mail list for product security notifications and announcements: VMSA-2016-0001 Initial security advisory in conjunction with the release of VMware ESXi 6.0 patches on. Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. Alternatively, version 10.0.0 of VMware Tools is available for independent download and includes the fix. The affected "Shared Folders" (HGFS) feature is installed by default on hosted (Workstation, Fusion, Player) products only. *After the update or patch is applied, VMware Tools must also be updated in any Windows-based guests that include the "Shared Folders" (HGFS) feature to resolve CVE-2015-6933. Removing the "Shared Folders" (HGFS) feature from previously installed VMware Tools will remove the possibility of exploitation.Ĭolumn 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. The Common Vulnerabilities and Exposures project () has assigned the identifier CVE-2015-6933 to this issue. ![]() ![]() Host memory can not be manipulated from the guest operating system by exploiting this flaw. ![]() Note: This vulnerability does not allow for privilege escalation from the guest operating system to the host. VMware would like to thank Dmitry Janushkevich from the Secunia Research Team for reporting this issue to us. Successful exploitation of this issue could lead to an escalation of privilege in the guest operating system. Important Windows-based guest privilege escalation in VMware ToolsĪ kernel memory corruption vulnerability is present in the VMware Tools "Shared Folders" (HGFS) feature running on Microsoft Windows. VMware ESXi 5.5 without patch ESXi550-201512102-SG LKML Archive on help / color / mirror / Atom feed PATCH 0/5 virtioring: per virtqueue DMA device 6:28 Jason Wang 6:28 PATCH 1/5 virtioring: per virtqueue dma device Jason Wang (5 more replies) 0 siblings, 6 replies 22+ messages in thread From: Jason Wang 6:28 UTC ( / raw) To: mst, jasowang +Cc: elic, gdawar.
0 Comments
Read More
Leave a Reply. |