|
|
|
|
| |
Credit:
The original article can be found at: http://www.vmware.com/security/advisories/VMSA-2010-0004.html/
|
| |
Vulnerable Systems:
* VMware ESX 4.0.0 without patch ESX400-201002406-SG
* VMware vMA 4.0 before patch 3
Immune Systems:
* VMWare VirtualCenter on Windows
* VMWare hosted Workstation
* VMWare hosted Player
* VMWare hosted ACE
* VMWare hosted Server
* VMWare hosted Fusion
* VMWare ESXi
* VMWare ESX version 4.0 (ESX400-201002406-SG)
* VMWare ESX version 3.5
* VMWare ESX version 3.0.3
* VMWare ESX version 2.5.5
* VMWare vMA version 4.0 on RHEL5 (Patch 3)
A heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially-crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library.
CVE Information:
CVE-2009-2905
Disclosure Timeline:
2010.03.03: Release of this Advisory
|
|
|
|
|