10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.97 High
EPSS
Percentile
99.7%
Problems addressed by these patches: I Arbitrary code execution and denial of service vulnerabilities This release fixes a security vulnerability that could allow a guest operating system user with administrative privileges to cause memory corruption in a host process, and thus potentially execute arbitrary code on the host. (CVE-2007-4496) This release fixes a denial of service vulnerability that could allow a guest operating system to cause a host process to become unresponsive or exit unexpectedly. (CVE-2007-4497) Thanks to Rafal Wojtczvk of McAfee for identifying and reporting these issues. ESX -– VMware ESX 3.0.1 Download Patch Bundle ESX-8258730 www.vmware.com/support/vi3/doc/esx-8258730-patch.html md5sum a06d0e36e403b0fe6bc6fbc76220a86d VMware ESX 3.0.0 Download Patch Bundle ESX-4809553 www.vmware.com/support/vi3/doc/esx-4809553-patch.html md5sum cd363526aab5fa6c45bf2509cb5ae500 NOTE: ESX 3.0.0 is nearing its End-of-life (10/05/2007) users should upgrade to at least 3.0.1 and preferably the newest release available. VMware ESX 2.5.4 upgrade to patch 10 (Build# 53326) VMware ESX 2.5.3 upgrade to patch 13 (Build# 52488) VMware ESX 2.1.3 upgrade to patch 8 (Build# 53228) VMware ESX 2.0.2 upgrade to patch 8 (Build# 52650) NOTE: ESX 3.0.2 is not affected by this issue Hosted products --------------- VMware Workstation 6.0.0 upgrade to version 6.0.1 (Build# 55017) VMware Workstation 5.5.4 upgrade to version 5.5.5 (Build# 56455) VMware Player 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware Player 1.0.4 upgrade to version 1.0.5 (Build# 56455) VMware Server 1.0.3 upgrade to version 1.0.4 (Build# 56528) VMware ACE 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware ACE 1.0.3 upgrade to version 1.0.4 (Build# 54075) II Hosted products DHCP security vulnerabilities addressed This release fixes several vulnerabilities in the DHCP server that could enable a specially crafted packets to gain system-level privileges. (CVE-2007-0061, CVE-2007-0062, CVE-2007-0063) Thanks to Neel Mehta and Ryan Smith of the IBM Internet Security Systems X-Force for discovering and researching these vulnerabilities. Hosted products --------------- VMware Workstation 6.0.0 upgrade to version 6.0.1 (Build# 55017) VMware Workstation 5.5.4 upgrade to version 5.5.5 (Build# 56455) VMware Player 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware Player 1.0.4 upgrade to version 1.0.5 (Build# 56455) VMware Server 1.0.3 upgrade to version 1.0.4 (Build# 56528) VMware ACE 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware ACE 1.0.3 upgrade to version 1.0.4 (Build# 54075) III Windows based hosted product vulnerability in IntraProcessLogging.dll and vielib.dll. This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file IntraProcessLogging.dll to overwrite files in a system. (CVE-2007-4059) This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file vielib.dll to overwrite files in a system. (CVE-2007-4155) Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities. Hosted products --------------- VMware Workstation 6.0.0 upgrade to version 6.0.1 (Build# 55017) VMware Workstation 5.5.4 upgrade to version 5.5.5 (Build# 56455) VMware Player 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware Player 1.0.4 upgrade to version 1.0.5 (Build# 56455) VMware Server 1.0.3 upgrade to version 1.0.4 (Build# 56528) VMware ACE 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware ACE 1.0.3 upgrade to version 1.0.4 (Build# 54075) IV Escalation of privileges on Windows hosted systems This release fixes a security vulnerability in which Workstation was starting registered Windows services in an insecure manner. This vulnerability could allow a malicious user to escalate user privileges. Thanks to Foundstone for discovering this vulnerability. Hosted products --------------- VMware Workstation 6.0.0 upgrade to version 6.0.1 (Build# 55017) VMware Workstation 5.5.4 upgrade to version 5.5.5 (Build# 56455) VMware Player 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware Player 1.0.4 upgrade to version 1.0.5 (Build# 56455) VMware Server 1.0.3 upgrade to version 1.0.4 (Build# 56528) VMware ACE 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware ACE 1.0.3 upgrade to version 1.0.4 (Build# 54075) V Potential denial of service using VMware Player This release fixes a problem that prevented VMware Player from launching. This problem was accompanied by the error message VMware Player unrecoverable error: (player) Exception 0xc0000005 (access violation) has occurred. Hosted products --------------- VMware Player 2.0.0 upgrade to version 2.0.1 (Build# 55017) VMware Player 1.0.4 upgrade to version 1.0.5 (Build# 56455) VI ESX Service Console updates
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0061
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1716
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4497