CVE-2012-5459
Published Nov 14, 2012
Last updated 7 years ago
Overview
- Description
- Untrusted search path vulnerability in VMware Workstation 8.x before 8.0.5 and VMware Player 4.x before 4.0.5 on Windows allows host OS users to gain host OS privileges via a Trojan horse DLL in a "system folder."
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.9
- Impact score
- 10
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81AFBBE6-0B3B-44DB-BBEB-08C8B2C39038" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D5FD2D7-9928-437B-8988-4FC955DE4F84" }, { "criteria": "cpe:2.3:a:vmware:player:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2932689-76D4-4907-9CF9-AD8F6B801579" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01483038-BC89-44BA-B07B-362FC5D7E8C1" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B671AC17-7064-4541-ADB3-FCD72109C766" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21644868-F1B0-4A8E-BE73-4F42BEB8E834" }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4944D9B1-A48B-4F32-951E-BEC3FEAC45FE" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" } ]