If HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.3 is installed but VMware Fusion is not, a local attacker can create a fake application directory and exploit the suid sudo helper in order to escalate to root.
References
Link | Resource |
---|---|
https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43219/ | |
https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43219/ |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43219/ - |
Information
Published : 2017-11-16 15:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16777
Mitre link : CVE-2017-16777
CVE.ORG link : CVE-2017-16777
JSON object : View
Products Affected
hashicorp
- vagrant
CWE
CWE-427
Uncontrolled Search Path Element