The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://security.gentoo.org/glsa/glsa-201209-25.xml | vendor-advisory x_refsource_GENTOO |
http://secunia.com/advisories/39206 | third-party-advisory x_refsource_SECUNIA |
http://lists.vmware.com/pipermail/security-announce/2010/000090.html | mailing-list x_refsource_MLIST |
http://secunia.com/advisories/39203 | third-party-advisory x_refsource_SECUNIA |
http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | mailing-list x_refsource_BUGTRAQ |
http://www.securitytracker.com/id?1023836 | vdb-entry x_refsource_SECTRACK |
http://www.securityfocus.com/bid/39395 | vdb-entry x_refsource_BID |
http://www.vmware.com/security/advisories/VMSA-2010-0007.html | x_refsource_CONFIRM |
http://secunia.com/advisories/39215 | third-party-advisory x_refsource_SECUNIA |
http://osvdb.org/63607 | vdb-entry x_refsource_OSVDB |
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | mailing-list x_refsource_FULLDISC |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |