Page 3 of 22 results (0.010 seconds)

CVSS: 7.8EPSS: 17%CPEs: 1EXPL: 0

The virtual machine process (VMX) in VMware Workstation before 5.5.4 does not properly read state information when moving from the ACPI sleep state to the run state, which allows attackers to cause a denial of service (virtual machine reboot) via unknown vectors. El proceso de máquina virtual (VMX) en VMware Workstation anterior a 5.5.4 no lee adecuadamente la informaci´no de estado cuando pasa del estado ACPI de suspensión a ejecución, lo cual permite a atacantes remotos provocar una denegación de servicio (reinicio de la máquina virtual) mediante vectores desconocidos. • http://osvdb.org/35508 http://secunia.com/advisories/25079 http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23732 http://www.securitytracker.com/id?1018011 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 http://www.vupen.com/english/advisories/2007/1592 https://exchange.xforce.ibmcloud.com/vulnerabilities/33990 •

CVSS: 6.3EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in the Shared Folders feature for VMware Workstation before 5.5.4, when a folder is shared, allows users on the guest system to write to arbitrary files on the host system via the "Backdoor I/O Port" interface. Vulnerabilidad de salto de directorio en la característica Shared Folders para VMware Workstation anterior 5.5.4, cuando una carpeta es compartida, permite a usuarios sobre el sistema invitado escribir archivos de su elección sobre sistema host a través de la interfaz "Puerto de puerta trasera de I/O". • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=521 http://secunia.com/advisories/25079 http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23721 http://www.securitytracker.com/id?1017980 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 http://www.vupen.com/english/advisories/2007/1592 •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 0

VMware Workstation before 5.5.4 allows attackers to cause a denial of service against the guest OS by causing the virtual machine process (VMX) to store malformed configuration information. La estación de trabajo VMware anterior a la 5.5.4 permite a atacantes remotos provocar una denegación de servicio contra el invitado OS haciendo que el proceso de la máquina virtual (VMX) almacene información de configuración mal formado. • http://secunia.com/advisories/25079 http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23732 http://www.securitytracker.com/id?1018011 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 http://www.vupen.com/english/advisories/2007/1592 https://exchange.xforce.ibmcloud.com/vulnerabilities/33992 •

CVSS: 7.8EPSS: 13%CPEs: 1EXPL: 0

The memory management in VMware Workstation before 5.5.4 allows attackers to cause a denial of service (Windows virtual machine crash) by triggering certain general protection faults (GPF). La gestión de memoria en VMware Workstation anterior a 5.5.4 permite a atacantes remotos provocar denegación de servicio (caida de la maquina virtual de windows)a través del disparo de ciertas averías generales de protección (GPF). • http://osvdb.org/35507 http://secunia.com/advisories/25079 http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=49 http://www.securityfocus.com/archive/1/467836/100/0/threaded http://www.securityfocus.com/archive/1/467936/30/6690/threaded http://www.securityfocus.com/archive/1/469011/30/6510/threaded http://www.securityfocus.com/bid/23732 http://www.securitytracker.com/id?1018011 http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html# •

CVSS: 10.0EPSS: 95%CPEs: 20EXPL: 1

Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040442.html http://secunia.com/advisories/18162 http://secunia.com/advisories/18344 http://securityreason.com/securityalert/282 http://securityreason.com/securityalert/289 http://securitytracker.com/id?1015401 http://www.gentoo.org/security/en/glsa/glsa-200601-04.xml http://www.kb.cert.org/vuls/id/856689 http://www.securityfocus.com/archive/1/419997/100/0/threaded http://www.securityfocus.com/archive/1/420017/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •