|
|
| |
Credit:
The information has been provided by Thomas Toth-Steiner .
The original article can be found at: http://www.securityfocus.com/bid/39407
|
| |
Vulnerable Systems:
* VMWare Workstation 6.5.3
* VMWare Workstation 6.5.2
* VMWare Workstation 6.5.1
* VMWare Workstation 6.5 build 118166
* VMWare Workstation 6.5.3 build 185404
* VMWare Workstation 6.5.2 build 156735
* VMWare VIX API 1.6
* VMWare Server 2.0.2 Build 203138
* VMWare Server 2.0.2
* VMWare Server 2.0.1 build 156745
* VMWare Server 2.0.1
* VMWare Server 2.0
* VMWare Player 2.5.4
* VMWare Player 2.5.3
* VMWare Player 2.5.2 build 156735
* VMWare Player 2.5.2
* VMWare Player 2.5.1
* VMWare Player 2.5 build 118166
* VMWare Player 2.5.3 build 185404
* VMWare Fusion 2.0.6 Build 196839
* VMWare Fusion 2.0.6
* VMWare Fusion 2.0.5
* VMWare Fusion 2.0.4
* VMWare Fusion 2.0.3
* VMWare Fusion 2.0.2 build 147997
* VMWare Fusion 2
Immune Systems:
* VMWare Workstation 6.5.4 build 246459
* VMWare VIX API 1.7
* VMWare Player 2.5.4 build 246459
* VMWare Fusion 2.0.7 Build 246742
Local attackers can exploit this issue to execute arbitrary code with elevated privileges on a host running the affected applications.
Vendor Status:
VMware had issued an update for this vulnerability
Patch Availability:
http://www.vmware.com/security/advisories/VMSA-2010-0007.html
CVE Information:
CVE-2010-1139
Disclosure Timeline:
Issue date: 2010-04-09
Updated on: 2010-04-12
|
|
|