Kernel Memory Address Disclosure and kASLR Bypass Vulnerability in VMware Tools on OS X

Kernel Memory Address Disclosure and kASLR Bypass Vulnerability in VMware Tools on OS X

CVE-2016-5328 · LOW Severity

AV:L/AC:L/AU:N/C:P/I:N/A:N

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

Learn more about our User Device Pen Test.