The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-201209-25.xml | vendor advisory |
http://secunia.com/advisories/39206 | third party advisory vendor advisory |
http://lists.vmware.com/pipermail/security-announce/2010/000090.html | mailing list patch vendor advisory |
http://secunia.com/advisories/39203 | third party advisory vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | mailing list |
http://www.securitytracker.com/id?1023836 | vdb entry |
http://www.securityfocus.com/bid/39395 | vdb entry |
http://www.vmware.com/security/advisories/VMSA-2010-0007.html | patch vendor advisory |
http://secunia.com/advisories/39215 | third party advisory vendor advisory |
http://osvdb.org/63607 | vdb entry |
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | mailing list |