CVE-2016-5329

VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/93888 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93888 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037103 - () http://www.securitytracker.com/id/1037103 -
References () http://www.vmware.com/security/advisories/VMSA-2016-0017.html - Vendor Advisory () http://www.vmware.com/security/advisories/VMSA-2016-0017.html - Vendor Advisory

Information

Published : 2016-12-29 09:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5329

Mitre link : CVE-2016-5329

CVE.ORG link : CVE-2016-5329


JSON object : View

Products Affected

vmware

  • fusion

apple

  • mac_os_x
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor