Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2017-16839
Disclosure Date: March 29, 2018 (last updated November 26, 2024)
Hashicorp vagrant-vmware-fusion 5.0.4 allows local users to steal root privileges if VMware Fusion is not installed.
0
Attacker Value
Unknown
CVE-2017-16512
Disclosure Date: March 29, 2018 (last updated November 26, 2024)
The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 through 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available.
0
Attacker Value
Unknown
CVE-2017-16873
Disclosure Date: March 29, 2018 (last updated November 26, 2024)
It is possible to exploit an unsanitized PATH in the suid binary that ships with vagrant-vmware-fusion 4.0.25 through 5.0.4 in order to escalate to root privileges.
0
Attacker Value
Unknown
CVE-2017-15884
Disclosure Date: October 31, 2017 (last updated November 26, 2024)
In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.0, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges.
0
Attacker Value
Unknown
CVE-2017-12579
Disclosure Date: October 19, 2017 (last updated November 26, 2024)
An insecure suid wrapper binary in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 4.0.24 and earlier allows a non-root user to obtain a root shell.
0
Attacker Value
Unknown
CVE-2017-11741
Disclosure Date: August 08, 2017 (last updated November 26, 2024)
HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.24 uses weak permissions for the sudo helper scripts, allows local users to execute arbitrary code with root privileges by overwriting one of the scripts.
0
Attacker Value
Unknown
CVE-2017-7642
Disclosure Date: August 02, 2017 (last updated November 26, 2024)
The sudo helper in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.21 allows local users to gain root privileges by leveraging failure to verify the path to the encoded ruby script or scrub the PATH variable.
0