In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.1, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges.
References
Link | Resource |
---|---|
https://m4.rkw.io/blog/cve201716001-local-root-privesc-in-hashicorp-vagrantvmwarefusion-501.html | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43220/ | |
https://m4.rkw.io/blog/cve201716001-local-root-privesc-in-hashicorp-vagrantvmwarefusion-501.html | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43220/ |
Configurations
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://m4.rkw.io/blog/cve201716001-local-root-privesc-in-hashicorp-vagrantvmwarefusion-501.html - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43220/ - |
Information
Published : 2017-11-06 17:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-16001
Mitre link : CVE-2017-16001
CVE.ORG link : CVE-2017-16001
JSON object : View
Products Affected
hashicorp
- vagrant
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')