|
|
| |
Credit:
The information has been provided by Mitja Kolsek .
The original article can be found at: http://www.securityfocus.com/bid/39394
|
| |
Vulnerable Systems:
* VMWare Workstation 6.5.3
* VMWare Workstation 6.5.2
* VMWare Workstation 6.5.1
* VMWare Workstation 6.5 build 118166
* VMWare VIX API 1.6
* VMWare Server 2.0.2 Build 203138
* VMWare Server 2.0.2
* VMWare Server 2.0.1 build 156745
* VMWare Server 2.0.1
* VMWare Server 2.0
* VMWare Player 2.5.3
* VMWare Player 2.5.2
* VMWare Player 2.5.1
* VMWare Player 2.5 build 118166
* VMWare Fusion 2.0.6 Build 196839
* VMWare Fusion 2.0.6
* VMWare Fusion 2.0.5
* VMWare Fusion 2.0.4
* VMWare Fusion 2.0.3
* VMWare Fusion 2.0.2 build 147997
* VMWare Fusion 3.0
* VMWare Fusion 2
* VMWare ESXi Server 4.0
* VMWare ESXi Server 3.5
* VMWare ESX Server 3.0.3
* VMWare ESX Server 2.5.5
* VMWare ESX Server 4.0
* VMWare ESX Server 3.5
* VMWare ACE 2.5.3 Build 185404
* VMWare ACE 2.5.2 build 156735
* VMWare ACE 2.5.2
* VMWare ACE 2.5.1
* VMWare ACE 2.5 build 118166
* VMWare ACE 2.6
Local attackers can exploit this issue to execute arbitrary code with elevated privileges; this may aid in other attacks. This issue only affects guest systems running on Windows.
Vendor Status:
VMware had issued an update for this vulnerability
Patch Availability:
http://www.vmware.com/security/advisories/VMSA-2010-0007.html
CVE Information:
CVE-2010-1142
Disclosure Timeline:
Issue date: 2010-04-09
Updated on: 2010-04-12
|
|
|