Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-201209-25.xml | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2008/1744 | vdb entry permissions required |
http://securitytracker.com/id?1020200 | vdb entry third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42872 | vdb entry third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647 | vdb entry third party advisory signature |
http://www.vmware.com/security/advisories/VMSA-2008-0009.html | vendor advisory |
http://secunia.com/advisories/30556 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081 | vdb entry third party advisory signature |
http://www.securityfocus.com/bid/29552 | vdb entry third party advisory |
http://www.securityfocus.com/archive/1/493080/100/0/threaded | mailing list vdb entry third party advisory |
http://securityreason.com/securityalert/3922 | third party advisory |