Page 5 of 47 results (0.009 seconds)

CVSS: 7.5EPSS: 8%CPEs: 17EXPL: 0

VMware ESXi 3.5 through 5.0 and ESX 3.5 through 4.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory overwrite) via NFS traffic. VMware ESXi 3.5 hasta 5.0 y ESX 3.5 hasta 4.1 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (sobrescritura de memoria) a través de tráfico NFS. • http://osvdb.org/81693 http://www.securityfocus.com/bid/53371 http://www.securitytracker.com/id?1027018 http://www.vmware.com/security/advisories/VMSA-2012-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/75375 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.3EPSS: 0%CPEs: 27EXPL: 0

VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors. VMware Workstation versiones 8.x anteriores a 8.0.2, VMware Player versiones 4.x anteriores a 4.0.2, VMware Fusion versiones 4.x anteriores a 4.1.2, VMware ESXi versiones 3.5 hasta 5.0, y VMware ESX versiones 3.5 hasta 4.1 utilizan una ACL incorrecta para la carpeta VMware Tools, que permite a los usuarios del Sistema Operativo invitado alcanzar privilegios de SO invitado por medio de vectores no especificados. • http://osvdb.org/81163 http://secunia.com/advisories/48782 http://www.securityfocus.com/bid/53006 http://www.securitytracker.com/id?1026922 http://www.securitytracker.com/id?1026923 http://www.vmware.com/security/advisories/VMSA-2012-0007.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.3EPSS: 0%CPEs: 6EXPL: 0

VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine. VMware ESXi v3.5, v4.0, y v4.1 y ESX v3.5, v4.0, y v4.1 no implementan de forma adecuada las operaciones I/O basadas en el puerto, lo que permite a usuarios del sistema obtener acceso al sistema operativo huésped sobre-escribiendo posiciones de memoria en bloques de memoria de solo lectura asociadas con la máquina virtual DOS. VMware suffers from a backdoor ROM overwrite privilege escalation vulnerability. • http://www.securityfocus.com/bid/52820 http://www.securitytracker.com/id?1026875 http://www.us-cert.gov/cas/techalerts/TA12-164A.html http://www.vmware.com/security/advisories/VMSA-2012-0006.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-042 https://exchange.xforce.ibmcloud.com/vulnerabilities/74480 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15209 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre& • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

The XPDM display driver in VMware ESXi 4.0, 4.1, and 5.0; VMware ESX 4.0 and 4.1; and VMware View before 4.6.1 allows guest OS users to gain guest OS privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors. El driver XPDM en VMware ESXi v4.0, v4.1, y v5.0; VMware ESX v4.0 y v4.1; y VMware View anterior a v4.6.1 permite a usuarios invitado del SO ganas privilegios de invitado o causar una denagación de servicio (NULL pointer dereference) mediante vectores no especificados • http://archives.neohapsis.com/archives/bugtraq/2012-03/0071.html http://osvdb.org/80115 http://secunia.com/advisories/48378 http://secunia.com/advisories/48379 http://www.securityfocus.com/bid/52524 http://www.securitytracker.com/id?1026814 http://www.securitytracker.com/id?1026818 http://www.vmware.com/security/advisories/VMSA-2012-0004.html http://www.vmware.com/security/advisories/VMSA-2012-0005.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval% • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in the WDDM display driver in VMware ESXi 4.0, 4.1, and 5.0; VMware ESX 4.0 and 4.1; and VMware View before 4.6.1 allows guest OS users to gain guest OS privileges via unspecified vectors. Desbordamiento de búfer en el driver WDDM en VMware ESXi v4.0, v4.1, y v5.0; VMware ESX v4.0 y v4.1; y VMware View anterior a v4.6.1, permite a usuarios invitados del OS obtener privilegios de invitado mediante vectores no especificados. • http://archives.neohapsis.com/archives/bugtraq/2012-03/0071.html http://osvdb.org/80117 http://secunia.com/advisories/48378 http://secunia.com/advisories/48379 http://www.securityfocus.com/bid/52524 http://www.securitytracker.com/id?1026814 http://www.securitytracker.com/id?1026818 http://www.vmware.com/security/advisories/VMSA-2012-0004.html http://www.vmware.com/security/advisories/VMSA-2012-0005.html https://exchange.xforce.ibmcloud.com/vulnerabilities/74097 https://oval.cisecu • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •