7.5 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
44.9%
Debian LTS Advisory DLA-3646-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
November 05, 2023 https://wiki.debian.org/LTS
Package : open-vm-tools
Version : 2:10.3.10-1+deb10u6
CVE ID : CVE-2023-34058 CVE-2023-34059
Debian Bug : 1054666
Brief introduction
CVE-2023-34058
A file descriptor hijack vulnerability was found in
the vmware-user-suid-wrapper command.
A malicious actor with non-root privileges might have been able
to hijack the /dev/uinput file descriptor allowing
them to simulate user inputs.
CVE-2023-34059
A SAML Token Signature Bypass vulnerability was found.
A malicious actor that has been granted Guest Operation Privileges
in a target virtual machine might have been able to
elevate their privileges if that target
virtual machine has been assigned a more privileged Guest Alias.
For Debian 10 buster, these problems have been fixed in version
2:10.3.10-1+deb10u6.
We recommend that you upgrade your open-vm-tools packages.
For the detailed security status of open-vm-tools please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/open-vm-tools
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
7.5 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
44.9%