Re: VMware GSX Server Remote Buffer Overflow

From: Eric Horschman (ehorschmanat_private)
Date: Thu Jul 25 2002 - 18:48:43 PDT

  • Next message: David Wagner: "Re: VNC authentication weakness"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <20020724103134.6884.qmailat_private>
    
    VMware has confirmed this vulnerability in VMware GSX Server 2.0.0 (for 
    Windows) build 2050.  Our testing also confirms that no other VMware 
    products are vulnerable to the posted exploit.
    
    We have created a patch for the vulnerability.  Users of VMware GSX Server 
    2.0.0 (for Windows) build 2050 should go to 
    http://www.vmware.com/download/gsx_security.html to download the VMware 
    Authorization Service patch.
    
    We will be releasing an update to VMware GSX Server 2.0 shortly that 
    incorporates a fix to this vulnerability.
    
    We want to thank the author of the original post for identifying this 
    vulnerability.
    



    This archive was generated by hypermail 2b30 : Thu Jul 25 2002 - 20:18:07 PDT