CVE-2013-3519
Published Dec 4, 2013
Last updated 11 years ago
Overview
- Description
- lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.9
- Impact score
- 10
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B439F706-27F8-4238-9396-B460EB78B6DC" }, { "criteria": "cpe:2.3:a:vmware:workstation:9.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B87CF2A3-422B-4B5C-9E90-382FF6373F38" }, { "criteria": "cpe:2.3:a:vmware:workstation:9.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BF4A5B6-C3E5-47B4-BC9E-14F544E3393E" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE" }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "364FBB12-E292-47BB-8D26-CED34232A135" }, { "criteria": "cpe:2.3:a:vmware:player:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEBF8C7B-7034-47B4-B84A-6987EB7B4DC5" }, { "criteria": "cpe:2.3:a:vmware:player:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "277B926D-C575-4526-9F0C-A1D6EAF2AA2D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EEF165A-4E09-4FF0-A577-FF429BCCF588" }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDC22BC2-DC74-4322-929C-7F82C083C1C7" }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B8954CF-E90D-4C6C-ACCE-4A2B24B7BB1A" }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF942219-A2F4-4ABC-8356-3626A9898075" } ], "operator": "OR" } ] } ]