Page 139 of 880 results (0.009 seconds)

CVSS: 9.0EPSS: 0%CPEs: 28EXPL: 0

VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS. VMware Workstation v8.x antes de v8.0.3, VMware Player v4.x antes de v4.0.3 VMware Fusion v4.x, antes de v4.1.2, VMware ESXi v3.5 hasta v5.0 y VMware ESX v3.5 hasta v4.1 no registra correctamente los dispositivos SCSI, lo que permite a los usuarios invitados del sistema operativo causar una denegación de servicio (operación de escritura no válida y caída del proceso VMX) o posiblemente ejecutar código arbitrario en el sistema operativo anfitrión mediante el aprovechamiento de privilegios de administrador en el sistema operativo invitado. • http://osvdb.org/81695 http://secunia.com/advisories/49032 http://www.securityfocus.com/bid/53369 http://www.securitytracker.com/id?1027019 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75377 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852 •

CVSS: 9.0EPSS: 0%CPEs: 29EXPL: 0

VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS. VMware Workstation v8.x antes de v8.0.3, VMware Player v4.x antes de v4.0.3, VMware Fusion v4.x hasta v4.1.2, VMware ESXi v3.5 hasta v5.0 y VMware ESX v3.5 hasta v4.1 no configura correctamente el dispositivo de disco virtual, lo que permite a los usuarios invitados del sistema operativo causar una denegación de servicio (operación de escritura fuera de los límites y la caída del proceso VMX) o posiblemente ejecutar código arbitrario en el sistema operativo anfitrión mediante el aprovechamiento de privilegios de administrador en el sistema operativo invitado. • http://osvdb.org/81694 http://secunia.com/advisories/49032 http://www.securityfocus.com/bid/53369 http://www.securitytracker.com/id?1027019 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75376 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.9EPSS: 0%CPEs: 14EXPL: 0

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers. El proceso de VMX en VMware ESXi v3.5 hasta v4.1 y ESX v3.5 hasta v4.1 no controla correctamente los comandos de RPC, lo que permite a los usuarios invitados de sistemas operativos causar una denegación de servicio (sobrescritura de memoria y caída del proceso) o posiblemente ejecutar código arbitrario en el sistema operativo anfitrión a través de vectores relacionados con punteros a funciones. • http://www.securityfocus.com/bid/53369 http://www.securitytracker.com/id?1027018 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75373 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16810 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers. El proceso de VMX en VMware ESXi v4.1 y ESX v4.1 no controla correctamente los comandos de RPC, lo que permite a los usuarios invitados de sistemas operativos causar una denegación de servicio (sobrescritura de memoria y caída del proceso) o posiblemente ejecutar código arbitrario en el sistema operativo anfitrión a través de vectores relacionados con punteros a funciones. • http://osvdb.org/81692 http://www.securityfocus.com/bid/53369 http://www.securitytracker.com/id?1027018 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75374 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17231 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 8%CPEs: 17EXPL: 0

VMware ESXi 3.5 through 5.0 and ESX 3.5 through 4.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory overwrite) via NFS traffic. VMware ESXi 3.5 hasta 5.0 y ESX 3.5 hasta 4.1 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (sobrescritura de memoria) a través de tráfico NFS. • http://osvdb.org/81693 http://www.securityfocus.com/bid/53371 http://www.securitytracker.com/id?1027018 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75375 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •