CVE-2011-2145
https://notcve.org/view.php?id=CVE-2011-2145
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error." mount.vmhgfs en el Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, cuando es utilizado un Sistema Operativo invitado de Solaris o FreeBSD, permite a los usuarios del sistema operativo invitado modificar archivos del sistema operativo invitado arbitrarios por medio de vectores no especificados, relacionados con un "procedural error". • http://secunia.com/advisories/44840 http://secunia.com/advisories/44904 http://www.securityfocus.com/bid/48098 http://www.securitytracker.com/id?1025601 http://www.vmware.com/security/advisories/VMSA-2011-0009.html https://exchange.xforce.ibmcloud.com/vulnerabilities/67815 https://hermes.opensuse.org/messages/8711677 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-1787
https://notcve.org/view.php?id=CVE-2011-1787
Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory. Una Condición de carrera en mount.vmhgfs en VMware Host Guest File System (HGFS) en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, permite a los usuarios del Sistema Operativo invitado alcanzar privilegios en el Sistema Operativo Invitado al montar un sistema de archivos sobre un directorio arbitrario. • http://secunia.com/advisories/44840 http://secunia.com/advisories/44904 http://www.securityfocus.com/bid/48098 http://www.securitytracker.com/id?1025601 http://www.vmware.com/security/advisories/VMSA-2011-0009.html https://hermes.opensuse.org/messages/8711677 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2011-1789
https://notcve.org/view.php?id=CVE-2011-1789
The self-extracting installer in the vSphere Client Installer package in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, VMware ESXi 4.x before 4.1 Update 1, and VMware ESX 4.x before 4.1 Update 1 does not have a digital signature, which might make it easier for remote attackers to spoof the software distribution via a Trojan horse installer. El instalador auto-extraible del cliente vSphere en VMware vCenter 4.0 anteriores a la Actualización 3 y v4.1 anteriores a la Actualización 1, VMware ESXi v4.x anteriores a v4.1 Actualización 1, y VMware ESX v4.x anteriores a v4.1 Actualización 1 no tiene una firma digital , lo que podría facilitar a los atacantes remotos a falsificar la distribución de software a través de un instalador troyanizado. • http://lists.vmware.com/pipermail/security-announce/2011/000137.html http://securitytracker.com/id?1025502 http://www.vmware.com/security/advisories/VMSA-2011-0008.html • CWE-310: Cryptographic Issues •
CVE-2011-1785
https://notcve.org/view.php?id=CVE-2011-1785
VMware ESXi 4.0 and 4.1 and ESX 4.0 and 4.1 allow remote attackers to cause a denial of service (socket exhaustion) via unspecified network traffic. VMware ESXi v4.0 y v4.1 y ESX v4.0 y v4.1 permite a atacantes remotos provocar una denegación de servicio (agotamiento del socket) a través de tráfico de red no especificado. • http://kb.vmware.com/kb/1035108 http://lists.vmware.com/pipermail/security-announce/2011/000133.html http://osvdb.org/72118 http://securityreason.com/securityalert/8240 http://securitytracker.com/id?1025452 http://www.securityfocus.com/archive/1/517739/100/0/threaded http://www.securityfocus.com/bid/47627 http://www.vmware.com/security/advisories/VMSA-2011-0007.html https://exchange.xforce.ibmcloud.com/vulnerabilities/67195 https://oval.cisecurity.org/repository/search/definition/oval% • CWE-399: Resource Management Errors •
CVE-2010-3609 – OpenSLP 1.2.1 / < 1647 trunk - Denial of Service
https://notcve.org/view.php?id=CVE-2010-3609
The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information. El analizador de extensiones en el archivo slp_v2message.c en OpenSLP versión 1.2.1 y otras versiones anteriores a la revisión SVN 1647, como es usado en demonio de Service Location Protocol (SLPD) en ESX versiones 4.0 y 4.1 y ESXi versiones 4.0 y 4.1 de VMware, permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un paquete con un "next extension offset" que hace referencia a esta extensión o una extensión previa. NOTA: algunos de estos detalles son obtenidos a partir de información de terceros. • https://www.exploit-db.com/exploits/17610 http://lists.vmware.com/pipermail/security-announce/2011/000126.html http://secunia.com/advisories/43601 http://secunia.com/advisories/43742 http://securityreason.com/securityalert/8127 http://securitytracker.com/id?1025168 http://www.kb.cert.org/vuls/id/393783 http://www.mandriva.com/security/advisories?name=MDVSA-2012:141 http://www.mandriva.com/security/advisories?name=MDVSA-2013:111 http://www.osvdb.org/71019 http://www.securityfoc •