Vulnerabilites related to vmware - horizon_view_client
Vulnerability from fkie_nvd
Published
2015-07-10 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:player:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "364FBB12-E292-47BB-8D26-CED34232A135",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEBF8C7B-7034-47B4-B84A-6987EB7B4DC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "277B926D-C575-4526-9F0C-A1D6EAF2AA2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:5.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E6EAA1-4828-4B94-931F-B92C54FD97D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:5.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C766686C-0EAE-4E7A-A5F2-F93A57991A53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBDD49B-0083-4743-B4F8-6214FE8F4822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AE914B-8688-4274-9D40-C3A166F112AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "043541FC-C4F9-4E71-8373-E9022DCC62DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "200179EA-B682-435D-948C-5B70B686D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEF03B6D-2A6D-4A99-BAE1-308CA1CAE633",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93872771-BD86-4707-926B-F6C3577C33A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B52D8903-B853-43A2-88C3-D79BBA70F8CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D0119B9-916C-4A98-8542-10FFC4F71C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA413B-AB24-4884-A052-2A30A0CA4E7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B2275C-913F-43D9-8146-0B0CD737E485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "01512B1C-ABCF-4705-91E8-F51FE6397343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74B9F8A-E336-4421-ADA8-D2640DD7E67E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "71B0563B-F300-448D-8450-9B7B862F4560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "CED170BC-88E4-44D9-A4C5-A2A190283985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "492D7AD2-D660-48F5-A9BE-28CCA6A6B658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F0250C-EE18-486B-90D7-348FEF01C2D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82AFF09-F9F6-486B-9299-3852EBD9B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9391EA21-2A10-445A-B88A-103025C9A343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.",
      },
      {
         lang: "es",
         value: "Vmware-vmx.exe en VMware Workstation 7.x hasta 10.x anterior a 10.0.7 y 11.xanterior a 11.1.1, VMware Player 5.x y 6.x anterior a 6.0.7 y 7.x anterior a 7.1.1, y VMware Horizont Client hasta la versión 5.4.2 en Windows. No proporciona un puntero DACL válido durante la instalación del proceso vprintproxy.exe, por lo que permite a los usuarios del sistema operativo obtener privilegios del sistema mediante la inyección de un hilo.",
      },
   ],
   id: "CVE-2015-3650",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-07-10T17:59:01.170",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032822",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032823",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0005.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032822",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032823",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7BA06B-60FB-456B-A4BF-401F82E88BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82AFF09-F9F6-486B-9299-3852EBD9B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9391EA21-2A10-445A-B88A-103025C9A343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "184E7883-BBAD-4687-881A-69F0A5341ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA730B34-3F72-451D-9960-DF44821A001C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67198AB1-95B1-4ECC-A4CE-E2EAE688E193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A09E65-9C4C-42FD-A1B0-E925A905875A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "92275180-52FC-48DE-947C-3AE1B87AF2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7EF002E-10E1-4405-8C55-BD91AD45B891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBDD49B-0083-4743-B4F8-6214FE8F4822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AE914B-8688-4274-9D40-C3A166F112AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "043541FC-C4F9-4E71-8373-E9022DCC62DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "200179EA-B682-435D-948C-5B70B686D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93872771-BD86-4707-926B-F6C3577C33A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B52D8903-B853-43A2-88C3-D79BBA70F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D0119B9-916C-4A98-8542-10FFC4F71C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA413B-AB24-4884-A052-2A30A0CA4E7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B2275C-913F-43D9-8146-0B0CD737E485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "01512B1C-ABCF-4705-91E8-F51FE6397343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74B9F8A-E336-4421-ADA8-D2640DD7E67E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "71B0563B-F300-448D-8450-9B7B862F4560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "492D7AD2-D660-48F5-A9BE-28CCA6A6B658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F0250C-EE18-486B-90D7-348FEF01C2D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.",
      },
      {
         lang: "es",
         value: "TPview.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado causar una denegación de servicio del sistema operativo anfitrión a través de vectores no especificados, una vulnerabilidad diferente a CVE-2015-2338.",
      },
   ],
   id: "CVE-2015-2339",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-13T14:59:02.873",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75092",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75092",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "184E7883-BBAD-4687-881A-69F0A5341ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA730B34-3F72-451D-9960-DF44821A001C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67198AB1-95B1-4ECC-A4CE-E2EAE688E193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A09E65-9C4C-42FD-A1B0-E925A905875A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "92275180-52FC-48DE-947C-3AE1B87AF2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7EF002E-10E1-4405-8C55-BD91AD45B891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBDD49B-0083-4743-B4F8-6214FE8F4822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AE914B-8688-4274-9D40-C3A166F112AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "043541FC-C4F9-4E71-8373-E9022DCC62DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "200179EA-B682-435D-948C-5B70B686D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93872771-BD86-4707-926B-F6C3577C33A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B52D8903-B853-43A2-88C3-D79BBA70F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D0119B9-916C-4A98-8542-10FFC4F71C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA413B-AB24-4884-A052-2A30A0CA4E7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B2275C-913F-43D9-8146-0B0CD737E485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "01512B1C-ABCF-4705-91E8-F51FE6397343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74B9F8A-E336-4421-ADA8-D2640DD7E67E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "71B0563B-F300-448D-8450-9B7B862F4560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "492D7AD2-D660-48F5-A9BE-28CCA6A6B658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F0250C-EE18-486B-90D7-348FEF01C2D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7BA06B-60FB-456B-A4BF-401F82E88BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82AFF09-F9F6-486B-9299-3852EBD9B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9391EA21-2A10-445A-B88A-103025C9A343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.",
      },
      {
         lang: "es",
         value: "TPInt.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado ejecutar código arbitrario en el sistema operativo anfitrión a través de vectores no especificados.",
      },
   ],
   id: "CVE-2015-2337",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-13T14:59:00.997",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75095",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75095",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "184E7883-BBAD-4687-881A-69F0A5341ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA730B34-3F72-451D-9960-DF44821A001C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67198AB1-95B1-4ECC-A4CE-E2EAE688E193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A09E65-9C4C-42FD-A1B0-E925A905875A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "92275180-52FC-48DE-947C-3AE1B87AF2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7EF002E-10E1-4405-8C55-BD91AD45B891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBDD49B-0083-4743-B4F8-6214FE8F4822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AE914B-8688-4274-9D40-C3A166F112AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "043541FC-C4F9-4E71-8373-E9022DCC62DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "200179EA-B682-435D-948C-5B70B686D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93872771-BD86-4707-926B-F6C3577C33A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B52D8903-B853-43A2-88C3-D79BBA70F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D0119B9-916C-4A98-8542-10FFC4F71C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA413B-AB24-4884-A052-2A30A0CA4E7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B2275C-913F-43D9-8146-0B0CD737E485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "01512B1C-ABCF-4705-91E8-F51FE6397343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74B9F8A-E336-4421-ADA8-D2640DD7E67E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "71B0563B-F300-448D-8450-9B7B862F4560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "492D7AD2-D660-48F5-A9BE-28CCA6A6B658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F0250C-EE18-486B-90D7-348FEF01C2D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7BA06B-60FB-456B-A4BF-401F82E88BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82AFF09-F9F6-486B-9299-3852EBD9B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9391EA21-2A10-445A-B88A-103025C9A343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.",
      },
      {
         lang: "es",
         value: "TPView.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado ejecutar código arbitrario sobre el sistema operativo anfitrión a través de vectores no especificados, una vulnerabilidad diferente a CVE-2012-0897.",
      },
   ],
   id: "CVE-2015-2336",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-13T14:59:00.077",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75095",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75095",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7BA06B-60FB-456B-A4BF-401F82E88BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82AFF09-F9F6-486B-9299-3852EBD9B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9391EA21-2A10-445A-B88A-103025C9A343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "184E7883-BBAD-4687-881A-69F0A5341ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA730B34-3F72-451D-9960-DF44821A001C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67198AB1-95B1-4ECC-A4CE-E2EAE688E193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A09E65-9C4C-42FD-A1B0-E925A905875A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "92275180-52FC-48DE-947C-3AE1B87AF2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7EF002E-10E1-4405-8C55-BD91AD45B891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBDD49B-0083-4743-B4F8-6214FE8F4822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AE914B-8688-4274-9D40-C3A166F112AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "043541FC-C4F9-4E71-8373-E9022DCC62DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "200179EA-B682-435D-948C-5B70B686D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93872771-BD86-4707-926B-F6C3577C33A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B52D8903-B853-43A2-88C3-D79BBA70F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D0119B9-916C-4A98-8542-10FFC4F71C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA413B-AB24-4884-A052-2A30A0CA4E7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B2275C-913F-43D9-8146-0B0CD737E485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "01512B1C-ABCF-4705-91E8-F51FE6397343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74B9F8A-E336-4421-ADA8-D2640DD7E67E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "71B0563B-F300-448D-8450-9B7B862F4560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "492D7AD2-D660-48F5-A9BE-28CCA6A6B658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F0250C-EE18-486B-90D7-348FEF01C2D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.",
      },
      {
         lang: "es",
         value: "TPview.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado causar una denegación de servicio del sistema operativo anfitrión a través de vectores no especificados, una vulnerabilidad diferente a CVE-2015-2339.",
      },
   ],
   id: "CVE-2015-2338",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-13T14:59:01.887",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75092",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75092",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7BA06B-60FB-456B-A4BF-401F82E88BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82AFF09-F9F6-486B-9299-3852EBD9B333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9391EA21-2A10-445A-B88A-103025C9A343",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "184E7883-BBAD-4687-881A-69F0A5341ACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA730B34-3F72-451D-9960-DF44821A001C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67198AB1-95B1-4ECC-A4CE-E2EAE688E193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A09E65-9C4C-42FD-A1B0-E925A905875A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "92275180-52FC-48DE-947C-3AE1B87AF2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7EF002E-10E1-4405-8C55-BD91AD45B891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBDD49B-0083-4743-B4F8-6214FE8F4822",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AE914B-8688-4274-9D40-C3A166F112AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "043541FC-C4F9-4E71-8373-E9022DCC62DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "200179EA-B682-435D-948C-5B70B686D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93872771-BD86-4707-926B-F6C3577C33A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B52D8903-B853-43A2-88C3-D79BBA70F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D0119B9-916C-4A98-8542-10FFC4F71C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CA413B-AB24-4884-A052-2A30A0CA4E7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4B2275C-913F-43D9-8146-0B0CD737E485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "01512B1C-ABCF-4705-91E8-F51FE6397343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A74B9F8A-E336-4421-ADA8-D2640DD7E67E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "71B0563B-F300-448D-8450-9B7B862F4560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "492D7AD2-D660-48F5-A9BE-28CCA6A6B658",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F0250C-EE18-486B-90D7-348FEF01C2D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.",
      },
      {
         lang: "es",
         value: "TPInt.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado causar una denegación de servicio del sistema operativo anfitrión a través de vectores no especificados.",
      },
   ],
   id: "CVE-2015-2340",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-06-13T14:59:03.763",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/75092",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75092",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032529",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1032530",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2015-2336
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.
References
http://www.securitytracker.com/id/1032529vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/75095vdb-entry, x_refsource_BID
http://www.vmware.com/security/advisories/VMSA-2015-0004.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id/1032530vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:15.942Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1032529",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032529",
               },
               {
                  name: "75095",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75095",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
               },
               {
                  name: "1032530",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032530",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-29T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1032529",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032529",
            },
            {
               name: "75095",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75095",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
            },
            {
               name: "1032530",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032530",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2336",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1032529",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032529",
                  },
                  {
                     name: "75095",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75095",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                  },
                  {
                     name: "1032530",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032530",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2336",
      datePublished: "2015-06-13T14:00:00",
      dateReserved: "2015-03-18T00:00:00",
      dateUpdated: "2024-08-06T05:10:15.942Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2340
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.
References
http://www.securitytracker.com/id/1032529vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/75092vdb-entry, x_refsource_BID
http://www.vmware.com/security/advisories/VMSA-2015-0004.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id/1032530vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:15.992Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1032529",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032529",
               },
               {
                  name: "75092",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75092",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
               },
               {
                  name: "1032530",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032530",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-29T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1032529",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032529",
            },
            {
               name: "75092",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75092",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
            },
            {
               name: "1032530",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032530",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2340",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1032529",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032529",
                  },
                  {
                     name: "75092",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75092",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                  },
                  {
                     name: "1032530",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032530",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2340",
      datePublished: "2015-06-13T14:00:00",
      dateReserved: "2015-03-18T00:00:00",
      dateUpdated: "2024-08-06T05:10:15.992Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2338
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.
References
http://www.securitytracker.com/id/1032529vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/75092vdb-entry, x_refsource_BID
http://www.vmware.com/security/advisories/VMSA-2015-0004.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id/1032530vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:15.947Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1032529",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032529",
               },
               {
                  name: "75092",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75092",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
               },
               {
                  name: "1032530",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032530",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-29T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1032529",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032529",
            },
            {
               name: "75092",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75092",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
            },
            {
               name: "1032530",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032530",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2338",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1032529",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032529",
                  },
                  {
                     name: "75092",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75092",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                  },
                  {
                     name: "1032530",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032530",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2338",
      datePublished: "2015-06-13T14:00:00",
      dateReserved: "2015-03-18T00:00:00",
      dateUpdated: "2024-08-06T05:10:15.947Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-3650
Vulnerability from cvelistv5
Published
2015-07-10 17:00
Modified
2024-08-06 05:47
Severity ?
Summary
vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:47:58.283Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2015-0005.html",
               },
               {
                  name: "1032822",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032822",
               },
               {
                  name: "1032823",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032823",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-07-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-23T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2015-0005.html",
            },
            {
               name: "1032822",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032822",
            },
            {
               name: "1032823",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032823",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-3650",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/",
                     refsource: "MISC",
                     url: "https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2015-0005.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2015-0005.html",
                  },
                  {
                     name: "1032822",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032822",
                  },
                  {
                     name: "1032823",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032823",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-3650",
      datePublished: "2015-07-10T17:00:00",
      dateReserved: "2015-05-06T00:00:00",
      dateUpdated: "2024-08-06T05:47:58.283Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2337
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
http://www.securitytracker.com/id/1032529vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/75095vdb-entry, x_refsource_BID
http://www.vmware.com/security/advisories/VMSA-2015-0004.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id/1032530vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:16.165Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1032529",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032529",
               },
               {
                  name: "75095",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75095",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
               },
               {
                  name: "1032530",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032530",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-29T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1032529",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032529",
            },
            {
               name: "75095",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75095",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
            },
            {
               name: "1032530",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032530",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2337",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1032529",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032529",
                  },
                  {
                     name: "75095",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75095",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                  },
                  {
                     name: "1032530",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032530",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2337",
      datePublished: "2015-06-13T14:00:00",
      dateReserved: "2015-03-18T00:00:00",
      dateUpdated: "2024-08-06T05:10:16.165Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-2339
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.
References
http://www.securitytracker.com/id/1032529vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/75092vdb-entry, x_refsource_BID
http://www.vmware.com/security/advisories/VMSA-2015-0004.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id/1032530vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:10:15.976Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1032529",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032529",
               },
               {
                  name: "75092",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75092",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
               },
               {
                  name: "1032530",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032530",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-29T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1032529",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032529",
            },
            {
               name: "75092",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75092",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
            },
            {
               name: "1032530",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032530",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-2339",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1032529",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032529",
                  },
                  {
                     name: "75092",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/75092",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2015-0004.html",
                  },
                  {
                     name: "1032530",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032530",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-2339",
      datePublished: "2015-06-13T14:00:00",
      dateReserved: "2015-03-18T00:00:00",
      dateUpdated: "2024-08-06T05:10:15.976Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}