VMware Flaws Allow Security Bypass on Mac OS X

    Eduard Kovacs wrote an interesting post about VMware Flaws Allow Security Bypass on Mac OS X that I would like to share.

    VMware has patched a couple of moderate-severity information disclosure vulnerabilities affecting some of the company’s Mac OS X products.

    Marco Grassi of Tencent’s KeenLab discovered that VMware Tools versions 9.x and 10.x have a flaw when running on OS X virtual machines (VMs). The vulnerability (CVE-2016-5328) can allow a local user to obtain information that can be leveraged to bypass a security mechanism.

    A similar flaw (CVE-2016-5329) affects version 8.x of VMware Fusion, a virtualization solution that allows users to run multiple guest operating systems on a Mac computer.

    “Successful exploitation of this issue may allow a privileged local user on a system where System Integrity Protection (SIP) is enabled, to obtain kernel memory addresses to bypass the kASLR protection mechanism. SIP is default enabled in the latest versions of Mac OS X,” reads VMware’s description for both the vulnerabilities.

    The vulnerability has been patched in VMware Tools with the release of version 10.1.0 and in VMware Fusion with the release of version 8.5. There are no known workarounds for these issues.

    This is the third advisory released by VMware in 2016 for a vulnerability in Tools, which includes utilities designed to enhance the performance of the VM guest operating system and improve VM management.

    In January, VMware announced patching an important privilege escalation flaw and, in August, it disclosed a DLL hijacking issue that could have been exploited for arbitrary code execution.”



     Eduard Kovacs


    Photo: www.computerworld.com


    No posts to display