|
|
| |
Credit:
The original article can be found at: http://www.securityfocus.com/bid/45169
The information has been provided by Aaron Portnoy and Logan Brown .
|
| |
Vulnerable Systems:
* VMWare Workstation 7.1
* VMWare Workstation 7.0.1 build 227600
* VMWare Workstation 7.0
* VMWare Server 2.0.2 Build 203138
* VMWare Server 2.0.2
* VMWare Server 2.0.1 build 156745
* VMWare Server 2.0.1
* VMWare Server 2.0
* VMWare Player 3.1
* VMWare Player 2.5.4
* VMWare Player 2.5.3
* VMWare Player 2.5.2 build 156735
* VMWare Player 2.5.2
* VMWare Player 2.5.1
* VMWare Player 2.5 build 118166
* VMWare Player 3.1
* VMWare Player 2.5.4 build 246459
* VMWare Player 2.5.3 build 185404
* VMWare Movie Decoder 6.5.4
* VMWare Movie Decoder 6.5.3
* VMWare Movie Decoder 6.5.3 build 185404
Immune Systems:
* VMWare Workstation 7.1.2 build 301548
* VMWare Workstation 6.5.3
* VMWare Workstation 6.5.2
* VMWare Workstation 6.5.1
* VMWare Workstation 6.5 build 118166
* VMWare Workstation 6.5.5 build 328052
* VMWare Workstation 6.5.4 build 246459
* VMWare Workstation 6.5.3 build 185404
* VMWare Workstation 6.5.2 build 156735
* VMWare Player 3.1.2 build 301548
* VMWare Player 2.5.5 Build 328052
* VMWare Movie Decoder 7.1.2 build 301548
* VMWare Movie Decoder 6.5.5 Build 328052
Successful exploits may allow attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in denial-of-service conditions.
Vendor Status:
VMware had issued an update for this vulnerability
Patch Availability:
http://www.vmware.com/security/advisories/VMSA-2010-0018.html
CVE Information:
CVE-2010-4294
Disclosure Timeline:
Issue date: 2010-12-02
Updated on: 2010-12-02 (initial release of advisory)
|
|
|