-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2006-0002 Synopsis: VMware Server sensitive information lifetime issue Advisory URL: http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2124 Issue date: 2006-06-01 Updated on: 2006-06-01 CVE Name: CVE-2006-2662 Bugzilla Number: pr98108
VMware Server doesn't limit the lifetime of sensitive data.
VMware has rated the severity of this issue as a Priority 3 issue according to Vmware's Security Response Policy.
VMware Server prior to RC-1.
When a console connection is made using VMware Server, user credentials are kept in memory. In order for the attacker to obtain information, they must have local access to the system and read access to the memory, or access to memory crash information.
This is only a danger if the attacker already has privileged access to your system.
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-2662 to this issue.
Upgrade to the latest packages: http://www.vmware.com/download/server/
The VMware Server product page at: http://www.vmware.com/products/server/
Understanding Data Lifetime via Whole System Simulation at: http://www.stanford.edu/~blp/papers/taint.pdf
VMware would like to thank Bart Vanautgaerden for reporting this issue.
The VMware Security Response Policy http://www.vmware.com/support/policies/security_response.html
Copyright 2006 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEf5icLsZLrftG15MRAiV/AJsHZqGGq9yzH7KHFZtRgVXJQnRh5gCg1u76 V9M5Q2tIS8dcycQsjO8Ejjc= =s5UB -----END PGP SIGNATURE-----