|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
VMware Workstation: executing DLL code
Synthesis of the vulnerability
An attacker can create a malicious DLL, and then put it in the current directory of VMware Workstation, in order to execute code.
Impacted products: VMware Workstation.
Severity of this bulletin: 2/4.
Consequences of an intrusion: user access/rights.
Hacker's origin: intranet server.
Creation date: 15/05/2019.
Références of this threat: CERTFR-2019-AVI-217, CVE-2019-5526, VIGILANCE-VUL-29307, VMSA-2019-0007.
Description of the vulnerability
An attacker can create a malicious DLL, and then put it in the current directory...
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides application vulnerability analysis. The Vigil@nce vulnerability database contains several thousand vulnerabilities. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system.