| Summary | VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file. |
|---|---|
| Publication Date | June 15, 2012, 5:55 a.m. |
| Registration Date | Jan. 28, 2021, 3 p.m. |
| Last Update | Nov. 21, 2024, 10:40 a.m. |
| CVSS2.0 : HIGH | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | はい |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.1.4.16648:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.1.5:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:4.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:* | |||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:* | |||||
| Title | 複数の VMware 製品におけるホスト OS 上で任意のコードを実行される脆弱性 |
|---|---|
| Summary | 複数の VMware 製品には、ホスト OS 上で任意のコードを実行される、またはサービス運用妨害 (メモリ破損) 状態となる脆弱性が存在します。 |
| Possible impacts | 攻撃者により、巧妙に細工されたチェックポイントファイルを介して、任意のコードを実行される、またはサービス運用妨害 (メモリ破損) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 14, 2012, midnight |
| Registration Date | June 18, 2012, 4:20 p.m. |
| Last Update | June 18, 2012, 4:20 p.m. |
| VMware |
| VMware ESX 3.5 から 4.1 |
| VMware ESXi 3.5 から 5.0 |
| VMware Fusion 4.1.3 未満の 4.x (Mac OS/X) |
| VMware Player 3.1.6 未満の 3.x |
| VMware Player 4.0.4 未満の 4.x |
| VMware Workstation 7.1.6 未満の 7.x |
| VMware Workstation 8.0.4 未満の 8.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年06月18日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |