The frame decompression functionality in the VMnc media codec in VMware Movie Decoder before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548 on Windows, VMware Player 2.5.x before 2.5.5 build 246459 and 3.x before 3.1.2 build 301548 on Windows, and VMware Server 2.x on Windows does not properly validate an unspecified size field, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted video file.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The frame decompression functionality in the VMnc media codec in VMware Movie Decoder before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548 on Windows, VMware Player 2.5.x before 2.5.5 build 246459 and 3.x before 3.1.2 build 301548 on Windows, and VMware Server 2.x on Windows does not properly validate an unspecified size field, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted video file.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.vmware.com/pipermail/security-announce/2010/000112.html | mailing-list x_refsource_MLIST |
http://www.vmware.com/security/advisories/VMSA-2010-0018.html | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/45169 | vdb-entry x_refsource_BID |
http://www.securityfocus.com/archive/1/514995/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://osvdb.org/69596 | vdb-entry x_refsource_OSVDB |
http://www.securitytracker.com/id?1024819 | vdb-entry x_refsource_SECTRACK |
http://secunia.com/advisories/42482 | third-party-advisory x_refsource_SECUNIA |
http://www.vupen.com/english/advisories/2010/3116 | vdb-entry x_refsource_VUPEN |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.vmware.com/pipermail/security-announce/2010/000112.html | mailing-list x_refsource_MLIST x_transferred |
http://www.vmware.com/security/advisories/VMSA-2010-0018.html | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/bid/45169 | vdb-entry x_refsource_BID x_transferred |
http://www.securityfocus.com/archive/1/514995/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://osvdb.org/69596 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.securitytracker.com/id?1024819 | vdb-entry x_refsource_SECTRACK x_transferred |
http://secunia.com/advisories/42482 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.vupen.com/english/advisories/2010/3116 | vdb-entry x_refsource_VUPEN x_transferred |
The frame decompression functionality in the VMnc media codec in VMware Movie Decoder before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548 on Windows, VMware Player 2.5.x before 2.5.5 build 246459 and 3.x before 3.1.2 build 301548 on Windows, and VMware Server 2.x on Windows does not properly validate an unspecified size field, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted video file.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |