VI Client in VMware VirtualCenter before 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2009/Apr/0036.html | mailing list |
http://www.securityfocus.com/bid/34373 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6376 | vdb entry signature |
http://www.vupen.com/english/advisories/2009/0944 | vdb entry |
http://lists.vmware.com/pipermail/security-announce/2009/000054.html | mailing list patch vendor advisory |
http://www.vmware.com/security/advisories/VMSA-2009-0005.html | |
http://secunia.com/advisories/34585 | third party advisory |