VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:00:58.025Z
Reserved: 2016-06-07T00:00:00
Link: CVE-2016-5328

No data.

Status : Modified
Published: 2016-12-29T09:59:00.180
Modified: 2024-11-21T02:54:06.533
Link: CVE-2016-5328

No data.