a. The creation of the VMX process on a Windows host can be hijacked leading to elevation of privilege.
Workstation does not handle paths appropriately. Successful exploitation of this issue may allow the path to the VMX executable, on a Windows host, to be hijacked by a non-administrator leading to elevation of privilege.
VMware would like to thank James Forshaw of Google Project Zero for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5511 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
CPE | Name | Operator | Version |
---|---|---|---|
workstation | lt | 15.0.3 | |
workstation | lt | 14.1.6 |