VMware has patched a couple of moderate-severity information disclosure vulnerabilities affecting some of the company’s Mac OS X products.
Marco Grassi of Tencent’s KeenLab discovered that VMware Tools versions 9.x and 10.x have a flaw when running on OS X virtual machines (VMs). The vulnerability (CVE-2016-5328) can allow a local user to obtain information that can be leveraged to bypass a security mechanism.
A similar flaw (CVE-2016-5329) affects version 8.x of VMware Fusion, a virtualization solution that allows users to run multiple guest operating systems on a Mac computer.
“Successful exploitation of this issue may allow a privileged local user on a system where System Integrity Protection (SIP) is enabled, to obtain kernel memory addresses to bypass the kASLR protection mechanism. SIP is default enabled in the latest versions of Mac OS X,” reads VMware’s description for both the vulnerabilities.
The vulnerability has been patched in VMware Tools with the release of version 10.1.0 and in VMware Fusion with the release of version 8.5. There are no known workarounds for these issues.
This is the third advisory released by VMware in 2016 for a vulnerability in Tools, which includes utilities designed to enhance the performance of the VM guest operating system and improve VM management.
In January, VMware announced patching an important privilege escalation flaw and, in August, it disclosed a DLL hijacking issue that could have been exploited for arbitrary code execution.
Related Reading: Hackers Invited to Target VMware at Pwn2Own 2016
Related Reading: VMware Patches Directory Traversal Flaw in Horizon View
Related Reading: Flaws Allow Attackers to Hijack VMware vRA Appliances

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
