Description
Two vulnerabilities have been identified in various VMware products, which could be exploited by attackers or malicious users to disclose sensitive information or gain elevated privileges. The first issue is caused due to an improper setting of the exception code on page faults on guest operating systems, which could allow malicious users to gain elevated privileges on a guest OS. The second vulnerability is caused by an unspecified input validation error, which could allow attackers with access to the network on which the host resides to download any file from the host system via directory traversal attacks
The following programs are vulnerable.
- VMware Workstation version 6.5.2 and prior
- VMware Player version 2.5.2 and prior
- VMware ACE version 2.5.2 and prior
- VMware Server version 2.0.1 and prior
- VMware Server version 1.0.9 and prior
- VMware Fusion version 2.0.5 and prior
- VMware ESXi version 4.0
- VMware ESXi version 3.5
- VMware ESX version 4.0
- VMware ESX version 3.5
- VMware ESX version 3.0.3
- VMware ESX version 2.5.5
Remediation
Apply patches or upgrade to fixed versions.
References
Related Vulnerabilities
WordPress Plugin Gallery-Flagallery Photo Portfolio Multiple Vulnerabilities (2.00)
WordPress Plugin Modern Events Calendar Lite Cross-Site Scripting (5.22.1)
Sqlite Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-6607)
WordPress Plugin Acunetix Secure WordPress Cross-Site Scripting (3.0.3)