| Summary | The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process. |
|---|---|
| Publication Date | April 13, 2010, 3:30 a.m. |
| Registration Date | Jan. 29, 2021, 10:59 a.m. |
| Last Update | May 15, 2013, 12:07 p.m. |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:* | |||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:* | |||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:3.0:*:*:*:*:*:*:* | |||||
| Title | 複数の VMware 製品の仮想ネットワークスタックにおける重要な情報を取得される脆弱性 |
|---|---|
| Summary | 複数の VMware 製品の仮想ネットワークスタックには、ホスト OS 上のメモリから重要な情報を取得される脆弱性が存在します。 |
| Possible impacts | 第三者により、ホスト OS 上のメモリから重要な情報を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | April 9, 2010, midnight |
| Registration Date | May 7, 2010, 5:25 p.m. |
| Last Update | May 7, 2010, 5:25 p.m. |
| VMware |
| VMware ACE 2.5.x |
| VMware ACE 2.6 |
| VMware Fusion 2.x |
| VMware Fusion 3.0 |
| VMware Player 2.5.x |
| VMware Player 3.0 |
| VMware Server 2.x |
| VMware Workstation 6.5.x |
| VMware Workstation 7.0 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2010年05月07日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |