VYPR
Medium severity5.5NVD Advisory· Published Dec 29, 2016· Updated May 6, 2026

CVE-2016-5328

CVE-2016-5328

Description

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

Affected products

23
  • VMware/Tools23 versions
    cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*+ 22 more
    • cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*range: <=10.0.8
    • cpe:2.3:a:vmware:tools:10.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:10.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:10.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.15:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.16:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.17:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.10.5:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.4.12:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.4.15:*:*:*:*:*:*:*
    • cpe:2.3:a:vmware:tools:9.4.5:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.