CVE-2007-4591
https://notcve.org/view.php?id=CVE-2007-4591
vstor-ws60.sys in VMWare Workstation 6.0 allows local users to cause a denial of service (host operating system crash) and possibly gain privileges by sending a small file buffer size value to the FsSetVolumeInformation IOCTL handler with an FsSetFileInformation subcode. vstor-ws60.sys en VMWare Workstation 6.0 permite a atacantes locales provocar una denegación de servicio (caída del sistema operativo del host) y posiblemente obtener privilegios mediante el envío de una valor pequeño de búfer de fichero al manejador IOCTL FsSetVolumeInformation con un subcódigo FsSetFileInformation. • http://marc.info/?l=bugtraq&m=118805138626360&w=2 http://secunia.com/advisories/26606 http://tarrysingh.blogspot.com/2007/08/security-vmware-workstation-6.html http://www.securityfocus.com/bid/25441 http://www.securitytracker.com/id?1018609 http://www.vupen.com/english/advisories/2007/2992 https://exchange.xforce.ibmcloud.com/vulnerabilities/36277 •
CVE-2007-4059 – VMware 'IntraProcessLogging.dll' 5.5.3.42958 - Arbitrary Data Write
https://notcve.org/view.php?id=CVE-2007-4059
Absolute path traversal vulnerability in a certain ActiveX control in IntraProcessLogging.dll 5.5.3.42958 in EMC VMware allows remote attackers to create or overwrite arbitrary files via a full pathname in the argument to the SetLogFileName method. Vulnerabilidad de salto de directorio absoluto en cierto control ActiveX en IntraProcessLogging.dll 5.5.3.42958 en EMC VMware permite a atacantes remotos crear o sobrescribir archivos de su elección a través de un nombre de ruta completa en el argumento en el método SetLogFileName. • https://www.exploit-db.com/exploits/4240 http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html http://secunia.com/advisories/26890 http://www.securityfocus.com/bid/25110 http://www.vmware.com/support/ace/doc/releasenotes_ace.html http://www.vmware.com/support/player/doc/releasenotes_player.html http://www.vmware.com/support/player2/doc/releasenotes_player2.html http://www.vmware.com/support/server/doc/releasenotes_server.html http://www.vmware.com/support •
CVE-2007-2491
https://notcve.org/view.php?id=CVE-2007-2491
The PIIX4 power management subsystem in EMC VMware Workstation 5.5.3.34685 and VMware Server 1.0.1.29996 allows local users to write to arbitrary memory locations via a crafted poke to I/O port 0x1004, triggering a denial of service (virtual machine crash) or other unspecified impact, a related issue to CVE-2007-1337. El subsitema de administración de alimentación PIIX4 en EMC VMware Workstation 5.5.3.34685 y VMware Server 1.0.1.29996 permite a usuarios locales escribir en posiciones de memoria de su elección mediante un escritura en memoria (poke) manipulada en el puerto de entrada/salida 0x1004, disparando una denegación de servicio (caída de máquina virtual) u otro impacto no especificado, tema relacionado en CVE-2007-1337. • http://osvdb.org/40088 http://taviso.decsystem.org/virtsec.pdf http://www.vupen.com/english/advisories/2007/1592 •
CVE-2007-1876
https://notcve.org/view.php?id=CVE-2007-1876
VMware Workstation before 5.5.4, when running a 64-bit Windows guest on a 64-bit host, allows local users to "corrupt the virtual machine's register context" by debugging a local program and stepping into a "syscall instruction." MVware Workstation anterior a 5.5.4, cuando ejecuta Windows 64-bits como invitado en un anfitrión de 64 bits, permite a usuarios locales "corromper el contexto de registro de la máquina virtual" mediante la depuración de un programa local y el paso a una "instrucción de llamada al sistema" (syscall instruction). • http://osvdb.org/35509 http://secunia.com/advisories/25079 http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23732 http://www.securitytracker.com/id?1018011 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 http://www.vupen.com/english/advisories/2007/1592 https://exchange.xforce.ibmcloud.com/vulnerabilities/33993 •
CVE-2007-1337
https://notcve.org/view.php?id=CVE-2007-1337
The virtual machine process (VMX) in VMware Workstation before 5.5.4 does not properly read state information when moving from the ACPI sleep state to the run state, which allows attackers to cause a denial of service (virtual machine reboot) via unknown vectors. El proceso de máquina virtual (VMX) en VMware Workstation anterior a 5.5.4 no lee adecuadamente la informaci´no de estado cuando pasa del estado ACPI de suspensión a ejecución, lo cual permite a atacantes remotos provocar una denegación de servicio (reinicio de la máquina virtual) mediante vectores desconocidos. • http://osvdb.org/35508 http://secunia.com/advisories/25079 http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23732 http://www.securitytracker.com/id?1018011 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 http://www.vupen.com/english/advisories/2007/1592 https://exchange.xforce.ibmcloud.com/vulnerabilities/33990 •