VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle paths appropriately. Successful exploitation of this issue may allow the path to the VMX executable, on a Windows host, to be hijacked by a non-administrator leading to elevation of privilege.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2019-0002.html | Patch Vendor Advisory |
https://www.vmware.com/security/advisories/VMSA-2019-0002.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vmware.com/security/advisories/VMSA-2019-0002.html - Patch, Vendor Advisory |
Information
Published : 2019-04-09 20:30
Updated : 2024-11-21 04:45
NVD link : CVE-2019-5511
Mitre link : CVE-2019-5511
CVE.ORG link : CVE-2019-5511
JSON object : View
Products Affected
vmware
- workstation
microsoft
- windows
CWE