CVE-2016-5328

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:10.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:10.0.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:vmware:tools:9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.10:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.11:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.12:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.13:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.0.17:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.10:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.11:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.12:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.4.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.10.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.10.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:tools:9.10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-12-29 09:59

Updated : 2024-02-04 19:11


NVD link : CVE-2016-5328

Mitre link : CVE-2016-5328

CVE.ORG link : CVE-2016-5328


JSON object : View

Products Affected

vmware

  • tools

apple

  • mac_os_x
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-254

7PK - Security Features