Medium severity5.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026
CVE-2016-5328
CVE-2016-5328
Description
VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
Affected products
23cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*+ 22 more
- cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*range: <=10.0.8
- cpe:2.3:a:vmware:tools:10.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:10.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:10.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:tools:9.4.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/93886nvdThird Party AdvisoryVDB Entry
- www.vmware.com/security/advisories/VMSA-2016-0017.htmlnvdVendor Advisory
- www.securitytracker.com/id/1037102nvd
News mentions
0No linked articles in our index yet.