Vulnerable Systems:
* VMware ESX 4.0
* VMWare ESX version 3.5
* VMWare ESX version 3.0.3
* VMWare ESX version 2.5.5
* VMware vMA 4.0 before patch 3
Immune Systems:
* VMWare VirtualCenter on Windows
* VMWare hosted Workstation
* VMWare hosted Player
* VMWare hosted ACE
* VMWare hosted Server
* VMWare hosted Fusion
* VMWare ESXi
* VMWare vMA version 4.0 on RHEL5 (Patch 3)
NTPD logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers through a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages.