Computer Security
[EN] securityvulns.ru no-pyccku


VMWare sandbox protection bypass
Published:04.12.2008
Source:
SecurityVulns ID:9481
Type:local
Threat Level:
6/10
Description:It's possilbe to access phisical memory from guest machine.
Affected:VMWARE : VMware Server 1.0
 VMWARE : VMWare Workstation 6.0
 VMWARE : VMWare Player 2.0
 VMWARE : VMWare ACE 2.0
 VMWARE : VMware ESX 3.0
 VMWARE : VMware ESXi 3.5
 VMWARE : VMware ESX 3.5
CVE:CVE-2008-4917 (Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption.)
Original documentdocumentVMWARE, VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2 (04.12.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod