Rapid7 VulnDB

VMware Workstation: Local Privilege Escalation on Windows based platforms by Hijacking VMware VMX configuration file (VMSA-2008-0005) (CVE-2008-1363)

Back to Search

VMware Workstation: Local Privilege Escalation on Windows based platforms by Hijacking VMware VMX configuration file (VMSA-2008-0005) (CVE-2008-1363)

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
03/19/2008
Created
07/25/2018
Added
02/18/2014
Modified
02/18/2014

Description

VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."

Solution(s)

  • vmware-workstation-upgrade-5_5_6
  • vmware-workstation-upgrade-6_0_3

References

  • vmware-workstation-upgrade-5_5_6
  • vmware-workstation-upgrade-6_0_3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;