// For flags

CVE-2016-7081

ThinPrint TPClnt/TPView Heap-based Buffer Overflow Privilege Escalation Vulnerability

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple heap-based buffer overflows in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.

Múltiples desbordamientos de búfer basados en memoria dinámica en VMware Workstation Pro 12.x en versiones anteriores a 12.5.0 y VMware Workstation Player 12.x en versiones anteriores a 12.5.0 en Windows, cuando la impresión virtual Cortado ThinPrint está habilitada, permiten a usuarios invitados del SO ejecutar código arbitrario en el SO anfitrión a través de vectores no especificados.

This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of ThinPrint. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the handling of print requests. The issue lies in the failure to properly validate the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to escalate privileges under the context of the host OS.

*Credits: E0DB6391795D7F629B5077842E649393
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-08-23 CVE Reserved
  • 2016-12-29 CVE Published
  • 2024-03-31 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Workstation Player
Search vendor "Vmware" for product "Workstation Player"
12.0.0
Search vendor "Vmware" for product "Workstation Player" and version "12.0.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Player
Search vendor "Vmware" for product "Workstation Player"
12.0.1
Search vendor "Vmware" for product "Workstation Player" and version "12.0.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Player
Search vendor "Vmware" for product "Workstation Player"
12.1.0
Search vendor "Vmware" for product "Workstation Player" and version "12.1.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Player
Search vendor "Vmware" for product "Workstation Player"
12.1.1
Search vendor "Vmware" for product "Workstation Player" and version "12.1.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Pro
Search vendor "Vmware" for product "Workstation Pro"
12.0.0
Search vendor "Vmware" for product "Workstation Pro" and version "12.0.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Pro
Search vendor "Vmware" for product "Workstation Pro"
12.0.1
Search vendor "Vmware" for product "Workstation Pro" and version "12.0.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Pro
Search vendor "Vmware" for product "Workstation Pro"
12.1.0
Search vendor "Vmware" for product "Workstation Pro" and version "12.1.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation Pro
Search vendor "Vmware" for product "Workstation Pro"
12.1.1
Search vendor "Vmware" for product "Workstation Pro" and version "12.1.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe