Wow serious VMWare vulnerability HOST system infection



A flaw in vmware could allow malicious code to be run on the host machine according to Sunbeltblog and citing VMWare’s knowledge base. This is pretty big since this is something that’s not considered as a threat. (Many people use vmware and other virtual machines for malware/virus/spyware investigations because they’re supposed to be isolated from the host machine.)


A vulnerability has been discovered in vmnat.exe on Windows hosts and vmnet-natd on Linux systems. The vulnerability in this component affects VMware Workstation 5.5, VMware GSX Server 3.2, VMware ACE 1.0.1, VMware Player 1.0, and previous releases of these products. The vulnerability makes it possible for a malicious guest using a NAT networking configuration to execute unwanted code on the host machine.
VMware believes that the vulnerability is very serious and recommends that affected users update their products to the new releases available at www.vmware.com/download or change the configuration of the virtual machine so it does not use NAT networking.

It even affects the recent vmware player as noted above.

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft taking a name... Slashdot has an interesting story up about the background of the selection of Windows Defender. It seems that an Australian software developer had a product called Windows Defender which protected Windows users from malicious websites. Well a short while back he got a call from lawyers associated with Microsoft about......
  • The Continuing Stooo-ry of the Sony DRM rootkit debacle.... Let's see there are a couple more notes to pass along on Sony DRM rootkit news. This story could go on for some time, it's already had legs for about a week or more and just when things started to wind down a bit, there's a bit more. First up,......
  • Microsoft's unpatched security bugs George Ou at ZDnet is mystified (as many of us are) at why Microsoft can't patch ALL their security vulnerabilities. Most of the unpatched vulnerabilities are considered minor (as was the 6 month old bug that in the last week was discovered could be exploited for more than a Denial......
Blog Traffic Exchange Related Websites
  • Download the Google Chrome OS Virtual Machine Last week, Techcrunch reported rumors of the release of the Google Chrome OS. They stated that the info came from a reliable source, and indeed that source was reliable. Google had an event at their headquarters, and indeed provided new details and a demo of the Chrome OS. The......
  • Adobe Systems Patches 17 Critical Security Holes On June 29, Adobe Systems plugged 17 critical security holes affecting Adobe Reader and Acrobat including a patch for a zero-day vulnerability that impacted many of their other products, on multiple operating systems such as Windows, Mac and Linux.  The new versions of Acrobat and Reader are 8.2.3 and 9.3.3,......
  • How to Use Coin Collecting Software Finding the value of your coins is something which most people who have a coin collection are very concerned with. This is true whether you are buying a set of coins or you have had your collection for a long period of time. There have been books over the years......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site