CVE-2014-3793
Published May 31, 2014
Last updated 6 years ago
Overview
- Description
- VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per http://cwe.mitre.org/data/definitions/476.html "CWE-476: NULL Pointer Dereference"
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF" }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA" }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F" }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822" }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39" }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80" }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A405802-D786-46F9-9E29-C727F9FD480A" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "469D98A5-7B8B-41BE-94C6-D6EF25388007" } ], "operator": "OR" } ] } ]