6.9
CVSSv2

CVE-2013-1662

Published: 24/08/2013 Updated: 26/08/2013
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 700
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

vmware-mount in VMware Workstation 8.x and 9.x and VMware Player 4.x and 5.x, on systems based on Debian GNU/Linux, allows host OS users to gain host OS privileges via a crafted lsb_release binary in a directory in the PATH, related to use of the popen library function.

Vulnerable Product Search on Vulmon Subscribe to Product

vmware workstation 8.0.1

vmware workstation 8.0.1.27038

vmware workstation 8.0.2

vmware workstation 8.0.6

vmware workstation 8.0.4

vmware workstation 8.0

vmware workstation 9.0.2

vmware workstation 9.0.1

vmware workstation 9.0

vmware workstation 8.0.3

vmware workstation 8.0.5

vmware workstation 8.0.0.18997

vmware player 4.0

vmware player 4.0.1

vmware player 4.0.2

vmware player 4.0.3

vmware player 4.0.4

vmware player 4.0.5

vmware player 4.0.6

vmware player 4.0.0.18997

vmware player 5.0.1

vmware player 5.0.2

vmware player 5.0

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'rex' require 'msf/core/post/common' require 'msf/core/post/file' class Metasploit4 ...
// Source: blogcmpxchg8bcom/2013/08/security-debianismshtml On most modern Linux systems, /bin/sh is provided by bash, which detects that it's being invoked as sh, and attempts to mimic traditional sh As everyone who works in security quickly learns, bash will drop privileges very early if uid != euid 488 489 if (running_setuid & ...