|
|
| |
Credit:
The information has been provided by Jure Skofic and Mitja Kolsek .
The original article can be found at: http://www.securityfocus.com/bid/39392
|
| |
Vulnerable Systems:
* VMWare Workstation 6.5.3
* VMWare Workstation 6.5.2
* VMWare Workstation 6.5.1
* VMWare Workstation 6.5 build 118166
* VMWare Server 2.0.2 Build 203138
* VMWare Server 2.0.2
* VMWare Server 2.0.1 build 156745
* VMWare Server 2.0.1
* VMWare Server 2.0
* VMWare Player 2.5.4
* VMWare Player 2.5.3
* VMWare Player 2.5.2
* VMWare Player 2.5.1
* VMWare Player 2.5 build 118166
* VMWare Movie Decoder 6.5.4
* VMWare Fusion 2.0.6
* VMWare Fusion 2.0.5
* VMWare Fusion 2.0.4
* VMWare Fusion 2.0.3
* VMWare Fusion 2.0.2 build 147997
* VMWare Fusion 2
* VMWare ESXi Server 4.0
* VMWare ESXi Server 3.5
* VMWare ESX Server 3.0.3
* VMWare ESX Server 2.5.5
* VMWare ESX Server 4.0
* VMWare ESX Server 3.5
Successful exploits will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Vendor Status:
VMware had issued an update for this vulnerability
Patch Availability:
http://www.vmware.com/security/advisories/VMSA-2010-0007.html
CVE Information:
CVE-2010-1141
Disclosure Timeline:
Issue date: 2010-04-09
Updated on: 2010-04-12
|
|
|