Page 4 of 19 results (0.011 seconds)

CVSS: 7.2EPSS: 0%CPEs: 83EXPL: 0

Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors. Vulnerabilidad no especificada en el archivo vmci.sys en la Virtual Machine Communication Interface (VMCI) en VMware Workstation v6.5.1 y anteriores, VMware Player v2.5.1 y anteriores, VMware ACE 2.5.1 y anteriores, y VMware Server v2.0.x anteriores a v2.0.1 build 156745 permite a los usuarios locales obtener privilegios a través de vectores desconocidos. • http://lists.vmware.com/pipermail/security-announce/2009/000054.html http://seclists.org/fulldisclosure/2009/Apr/0036.html http://www.securityfocus.com/bid/34373 http://www.securitytracker.com/id?1021976 http://www.vmware.com/security/advisories/VMSA-2009-0005.html http://www.vupen.com/english/advisories/2009/0944 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5471 •

CVSS: 6.8EPSS: 5%CPEs: 4EXPL: 1

Heap-based buffer overflow in the VNnc Codec in VMware Workstation 6.5.x before 6.5.2 build 156735, VMware Player 2.5.x before 2.5.2 build 156735, VMware ACE 2.5.x before 2.5.2 build 156735, and VMware Server 2.0.x before 2.0.1 build 156745 allows remote attackers to execute arbitrary code via a crafted web page or video file, aka ZDI-CAN-436. Desbordamiento de búfer basado en montículo en VNnc Codec en VMware Workstation 6.5.x versiones anteriores a v6.5.2 build 156735, VMware Player 2.5.x versiones anteriores a v2.5.2 build 156735, VMware ACE 2.5.x versiones anteriores a v2.5.2 build 156735, y VMware Server 2.0.x versiones anteriores a v2.0.1 build 156745 permite ejecutar código de su elección a través de un página web manipulada o fichero de video, también conocido como ZDI-CVE-436. • http://lists.vmware.com/pipermail/security-announce/2009/000054.html http://seclists.org/fulldisclosure/2009/Apr/0036.html http://security.gentoo.org/glsa/glsa-201209-25.xml http://www.securityfocus.com/bid/34373 http://www.securitytracker.com/id?1021974 http://www.vmware.com/security/advisories/VMSA-2009-0005.html http://www.vupen.com/english/advisories/2009/0944 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 6%CPEs: 41EXPL: 2

vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command. En la biblioteca vmwarebase.dll, tal y como es usado en el servicio vmware-authd (también se conoce como vmware-authd.exe), en VMware Workstation versión 6.5.1 build 126130, versión 6.5.1 y anteriores; VMware Player versión 2.5.1 build 126130, versión 2.5.1 y anteriores; VMware ACE versión 2.5.1 y anteriores; VMware Server versiones 2.0.x anteriores a 2.0.1 build 156745; y VMware Fusion anterior a versión 2.0.2 build 147997, permite a atacantes remotos causar una denegación de servicio (bloqueo del demonio) por medio de un comando largo (1) USUARIO o (2) PASS. • https://www.exploit-db.com/exploits/7647 http://lists.vmware.com/pipermail/security-announce/2009/000054.html http://osvdb.org/51180 http://seclists.org/fulldisclosure/2009/Apr/0036.html http://secunia.com/advisories/33372 http://secunia.com/advisories/34601 http://www.securityfocus.com/bid/34373 http://www.securitytracker.com/id?1021512 http://www.vmware.com/security/advisories/VMSA-2009-0005.html http://www.vupen.com/english/advisories/2009/0024 http://www.vupen.com/ • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 95%CPEs: 20EXPL: 1

Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040442.html http://secunia.com/advisories/18162 http://secunia.com/advisories/18344 http://securityreason.com/securityalert/282 http://securityreason.com/securityalert/289 http://securitytracker.com/id?1015401 http://www.gentoo.org/security/en/glsa/glsa-200601-04.xml http://www.kb.cert.org/vuls/id/856689 http://www.securityfocus.com/archive/1/419997/100/0/threaded http://www.securityfocus.com/archive/1/420017/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •