// For flags

CVE-2009-3281

VMware Fusion 2.0.5 - vmx86 kext Kernel Privilege Escalation

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors.

La extensión del núcleo vmx86 en VMware Fusion v2.0.6 anterior a build 196839 no utiliza los permisos de archivo correctos, lo cual permite a los usuarios del sistema operativo anfitrion obtener privilegios en el sistema operativo anfitrión a través de vectores no especificados.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-09-21 CVE Reserved
  • 2009-10-02 CVE Published
  • 2009-10-02 First Exploit
  • 2024-09-17 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
<= 2.0.5
Search vendor "Vmware" for product "Fusion" and version " <= 2.0.5"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
1.0
Search vendor "Vmware" for product "Fusion" and version "1.0"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
1.1
Search vendor "Vmware" for product "Fusion" and version "1.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
1.1.1
Search vendor "Vmware" for product "Fusion" and version "1.1.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
1.1.2
Search vendor "Vmware" for product "Fusion" and version "1.1.2"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
1.1.3
Search vendor "Vmware" for product "Fusion" and version "1.1.3"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
2.0
Search vendor "Vmware" for product "Fusion" and version "2.0"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
2.0.1
Search vendor "Vmware" for product "Fusion" and version "2.0.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
2.0.2
Search vendor "Vmware" for product "Fusion" and version "2.0.2"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
2.0.3
Search vendor "Vmware" for product "Fusion" and version "2.0.3"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
2.0.4
Search vendor "Vmware" for product "Fusion" and version "2.0.4"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
*-
Safe