CVE-2012-2448
https://notcve.org/view.php?id=CVE-2012-2448
VMware ESXi 3.5 through 5.0 and ESX 3.5 through 4.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory overwrite) via NFS traffic. VMware ESXi 3.5 hasta 5.0 y ESX 3.5 hasta 4.1 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (sobrescritura de memoria) a través de tráfico NFS. • http://osvdb.org/81693 http://www.securityfocus.com/bid/53371 http://www.securitytracker.com/id?1027018 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75375 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-1518
https://notcve.org/view.php?id=CVE-2012-1518
VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors. VMware Workstation versiones 8.x anteriores a 8.0.2, VMware Player versiones 4.x anteriores a 4.0.2, VMware Fusion versiones 4.x anteriores a 4.1.2, VMware ESXi versiones 3.5 hasta 5.0, y VMware ESX versiones 3.5 hasta 4.1 utilizan una ACL incorrecta para la carpeta VMware Tools, que permite a los usuarios del Sistema Operativo invitado alcanzar privilegios de SO invitado por medio de vectores no especificados. • http://osvdb.org/81163 http://secunia.com/advisories/48782 http://www.securityfocus.com/bid/53006 http://www.securitytracker.com/id?1026922 http://www.securitytracker.com/id?1026923 http://www.vmware.com/security/advisories/VMSA-2012-0007.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-1515 – VMware High-Bandwidth Backdoor ROM Overwrite Privilege Elevation
https://notcve.org/view.php?id=CVE-2012-1515
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine. VMware ESXi v3.5, v4.0, y v4.1 y ESX v3.5, v4.0, y v4.1 no implementan de forma adecuada las operaciones I/O basadas en el puerto, lo que permite a usuarios del sistema obtener acceso al sistema operativo huésped sobre-escribiendo posiciones de memoria en bloques de memoria de solo lectura asociadas con la máquina virtual DOS. VMware suffers from a backdoor ROM overwrite privilege escalation vulnerability. • http://www.securityfocus.com/bid/52820 http://www.securitytracker.com/id?1026875 http://www.us-cert.gov/cas/techalerts/TA12-164A.html http://www.vmware.com/security/advisories/VMSA-2012-0006.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-042 https://exchange.xforce.ibmcloud.com/vulnerabilities/74480 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15209 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre& • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-2146
https://notcve.org/view.php?id=CVE-2011-2146
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors. mount.vmhgfs en Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, permite a los usuarios del Sistema Operativo invitado determinar la existencia de archivos y directorios del sistema operativo host por medio de vectores no especificados. • http://secunia.com/advisories/44840 http://secunia.com/advisories/44904 http://www.securityfocus.com/bid/48098 http://www.securitytracker.com/id?1025601 http://www.vmware.com/security/advisories/VMSA-2011-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/67813 https://hermes.opensuse.org/messages/8711677 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-2145
https://notcve.org/view.php?id=CVE-2011-2145
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error." mount.vmhgfs en el Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, cuando es utilizado un Sistema Operativo invitado de Solaris o FreeBSD, permite a los usuarios del sistema operativo invitado modificar archivos del sistema operativo invitado arbitrarios por medio de vectores no especificados, relacionados con un "procedural error". • http://secunia.com/advisories/44840 http://secunia.com/advisories/44904 http://www.securityfocus.com/bid/48098 http://www.securitytracker.com/id?1025601 http://www.vmware.com/security/advisories/VMSA-2011-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/67815 https://hermes.opensuse.org/messages/8711677 • CWE-264: Permissions, Privileges, and Access Controls •