CVE-2017-4898
Published Jun 7, 2017
Last updated 5 years ago
Overview
- Description
- VMware Workstation Pro/Player 12.x before 12.5.3 contains a DLL loading vulnerability that occurs due to the "vmware-vmx" process loading DLLs from a path defined in the local environment-variable. Successful exploitation of this issue may allow normal users to escalate privileges to System in the host machine where VMware Workstation is installed.
- Source
- security@vmware.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 6
- Exploitability score
- 2
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ABE47D4-506C-4132-829B-19A61ED35F4A" }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67CDB0AC-25B6-4397-9784-386C81C37352" }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C48608C8-B7A6-47DD-8C78-44EB2B0D6C0C" }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E1D4E53-DEB3-4143-B619-4431DB47341F" }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C83B3D50-43FF-4034-9C75-F44939D60378" }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1613CB4-1088-40F1-A5E8-584284A980D0" }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3E8337D-BC36-4910-A998-309D277D008C" }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E91FE31-B442-4EE3-A415-D635A5CCA6C2" }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C67B92FB-CE89-479D-97DF-237C77BF307B" }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8A83855-1411-4CA8-A005-5AA58D1CB32A" }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3516D484-83AF-470E-9E9A-AFE3BBE4F75D" }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F5A845C-E2CA-4C3A-8019-22C7DC2EA6DB" } ], "operator": "OR" } ] } ]