VMware Tools 9.x and 10.x prior to 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
vmware tools 10.0.5 |
||
vmware tools 10.0.6 |
||
vmware tools 10.0.0 |
||
vmware tools |
||
vmware tools 9.0.1 |
||
vmware tools 9.0.16 |
||
vmware tools 9.0.17 |
||
vmware tools 9.10.0 |
||
vmware tools 9.10.1 |
||
vmware tools 9.0.11 |
||
vmware tools 9.0.12 |
||
vmware tools 9.4.10 |
||
vmware tools 9.4.11 |
||
vmware tools 9.0.13 |
||
vmware tools 9.0.15 |
||
vmware tools 9.4.12 |
||
vmware tools 9.4.15 |
||
vmware tools 9.0.5 |
||
vmware tools 9.0.10 |
||
vmware tools 9.4.0 |
||
vmware tools 9.4.5 |
||
vmware tools 9.10.5 |
||
vmware tools 9.0.0 |