In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.0, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges.
References
Link | Resource |
---|---|
https://m4.rkw.io/blog/cve201715884-local-root-privesc-in-hashicorp-vagrantvmwarefusion-500.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43222/ | |
https://m4.rkw.io/blog/cve201715884-local-root-privesc-in-hashicorp-vagrantvmwarefusion-500.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43222/ |
Configurations
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://m4.rkw.io/blog/cve201715884-local-root-privesc-in-hashicorp-vagrantvmwarefusion-500.html - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43222/ - |
Information
Published : 2017-10-31 18:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15884
Mitre link : CVE-2017-15884
CVE.ORG link : CVE-2017-15884
JSON object : View
Products Affected
hashicorp
- vagrant_vmware_fusion
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')