VMware has released software updates for several of its products to address a vulnerability that can be exploited to elevate privileges and execute arbitrary code on affected systems.
The host privilege escalation bug (CVE-2015-3650) affects VMware Workstation, Player, and Horizon View Client for Windows. The issue, which exists because these products do not set a discretionary access control list (DACL) for one of their processes, allows a local attacker to elevate privileges and execute arbitrary code in the context of the impacted process.
VMware is advising VMware Workstation 11.x and 10.x users to upgrade their installations to versions 11.1.1 and 10.0.7, respectively. VMware Player 7.x and 6.x customers should install versions 7.1.1 and 6.0.7, respectively.
The vulnerability has been resolved in VMware Horizon Client for Windows (with Local Mode Option) 5.x with the release of version 5.4.2. VMware Horizon Client for Windows version 3.x is not affected.
The privilege escalation vulnerability was reported by Kyriakos Economou of cyber and risk management consultancy Nettitude.
Last month, VMware patched a total of seven vulnerabilities affecting Workstation, Player, and Horizon View Client for Windows. The bugs patched in June can be exploited for arbitrary code execution and denial-of-service (DoS) attacks.