Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Abonnez-vous gratuitement à notre NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Se désabonner

Vigil@nce - VMware ESX, Player, Workstation : privilege escalation via lgtosync.sys

décembre 2013 par Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

A local attacker can corrupt the memory of lgtosync.sys of VMware
ESX, Player and Workstation, in order to escalate his privileges.

Impacted products : ESX, ESXi, VMware Player, VMware vSphere
Hypervisor, VMware Workstation

Severity : 2/4

Creation date : 04/12/2013

DESCRIPTION OF THE VULNERABILITY

The VMware ESX, Player and Workstation products install the
lgtosync.sys driver on guest systems of type Windows.

However, an attacker in the guest system can corrupt the memory of
this driver, in order to execute code with system privileges in
the guest system.

A local attacker can therefore corrupt the memory of lgtosync.sys
of VMware ESX, Player and Workstation, in order to escalate his
privileges.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/VMware-ESX-Player-Workstation-privilege-escalation-via-lgtosync-sys-13867


Voir les articles précédents

    

Voir les articles suivants