CVE-2012-5458
Published Nov 14, 2012
Last updated 7 years ago
Overview
- Description
- VMware Workstation 8.x before 8.0.5 and VMware Player 4.x before 4.0.5 on Windows use weak permissions for unspecified process threads, which allows host OS users to gain host OS privileges via a crafted application.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 8.3
- Impact score
- 10
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81AFBBE6-0B3B-44DB-BBEB-08C8B2C39038" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D5FD2D7-9928-437B-8988-4FC955DE4F84" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2932689-76D4-4907-9CF9-AD8F6B801579" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01483038-BC89-44BA-B07B-362FC5D7E8C1" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B671AC17-7064-4541-ADB3-FCD72109C766" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21644868-F1B0-4A8E-BE73-4F42BEB8E834" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4944D9B1-A48B-4F32-951E-BEC3FEAC45FE" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" } ]