// For flags

CVE-2010-4295

 

Severity Score

6.9
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files.

Condición de carrera en el proceso de montaje de vmware-mount en VMware Workstation 7.x anteriores a la 7.1.2 build 301548 en Linux, VMware Player 3.1.x anteriores a la 3.1.2 build 301548 en Linux, VMware Server 2.0.2 en Linux, y VMware Fusion 3.1.x anteriores a la 3.1.2 build 332101 permite a usuarios del SO anfitrión escalar privilegios a través de vectores que involucran archivos temporales.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-11-18 CVE Reserved
  • 2010-12-03 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.0
Search vendor "Vmware" for product "Workstation" and version "7.0"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.0.1
Search vendor "Vmware" for product "Workstation" and version "7.0.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.1
Search vendor "Vmware" for product "Workstation" and version "7.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.1.1
Search vendor "Vmware" for product "Workstation" and version "7.1.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.1.2
Search vendor "Vmware" for product "Workstation" and version "7.1.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
3.1
Search vendor "Vmware" for product "Player" and version "3.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
3.1.1
Search vendor "Vmware" for product "Player" and version "3.1.1"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
3.1.2
Search vendor "Vmware" for product "Player" and version "3.1.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Server
Search vendor "Vmware" for product "Server"
2.0.2
Search vendor "Vmware" for product "Server" and version "2.0.2"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
3.1
Search vendor "Vmware" for product "Fusion" and version "3.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
--
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
3.1.1
Search vendor "Vmware" for product "Fusion" and version "3.1.1"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
--
Safe
Vmware
Search vendor "Vmware"
Fusion
Search vendor "Vmware" for product "Fusion"
3.1.2
Search vendor "Vmware" for product "Fusion" and version "3.1.2"
-
Affected
in Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
--
Safe