CVE-2010-1138
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
12/04/2010
Last modified:
11/04/2025
Description
The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
- http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
- http://lists.vmware.com/pipermail/security-announce/2010/000090.html
- http://osvdb.org/63607
- http://secunia.com/advisories/39203
- http://secunia.com/advisories/39206
- http://secunia.com/advisories/39215
- http://security.gentoo.org/glsa/glsa-201209-25.xml
- http://www.securityfocus.com/bid/39395
- http://www.securitytracker.com/id?1023836=
- http://www.vmware.com/security/advisories/VMSA-2010-0007.html
- http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
- http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
- http://lists.vmware.com/pipermail/security-announce/2010/000090.html
- http://osvdb.org/63607
- http://secunia.com/advisories/39203
- http://secunia.com/advisories/39206
- http://secunia.com/advisories/39215
- http://security.gentoo.org/glsa/glsa-201209-25.xml
- http://www.securityfocus.com/bid/39395
- http://www.securitytracker.com/id?1023836=
- http://www.vmware.com/security/advisories/VMSA-2010-0007.html



