| Title | 複数の VMware 製品の仮想ネットワークスタックにおける重要な情報を取得される脆弱性 |
|---|---|
| Summary | 複数の VMware 製品の仮想ネットワークスタックには、ホスト OS 上のメモリから重要な情報を取得される脆弱性が存在します。 |
| Possible impacts | 第三者により、ホスト OS 上のメモリから重要な情報を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | April 9, 2010, midnight |
| Registration Date | May 7, 2010, 5:25 p.m. |
| Last Update | May 7, 2010, 5:25 p.m. |
| CVSS2.0 : 警告 | |
| Score | 5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
| VMware |
| VMware ACE 2.5.x |
| VMware ACE 2.6 |
| VMware Fusion 2.x |
| VMware Fusion 3.0 |
| VMware Player 2.5.x |
| VMware Player 3.0 |
| VMware Server 2.x |
| VMware Workstation 6.5.x |
| VMware Workstation 7.0 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2010年05月07日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process. |
|---|---|
| Publication Date | April 13, 2010, 3:30 a.m. |
| Registration Date | Jan. 29, 2021, 10:59 a.m. |
| Last Update | May 15, 2013, 12:07 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:* | |||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:* | |||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:3.0:*:*:*:*:*:*:* | |||||