The virtual machine process (VMX) in VMware Workstation before 5.5.4 does not properly read state information when moving from the ACPI sleep state to the run state, which allows attackers to cause a denial of service (virtual machine reboot) via unknown vectors.
References
Configurations
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/35508 - | |
References | () http://secunia.com/advisories/25079 - | |
References | () http://www.securityfocus.com/archive/1/467936/30/6690/threaded - | |
References | () http://www.securityfocus.com/archive/1/469011/30/6510/threaded - | |
References | () http://www.securityfocus.com/bid/23732 - | |
References | () http://www.securitytracker.com/id?1018011 - | |
References | () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554 - Patch | |
References | () http://www.vupen.com/english/advisories/2007/1592 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33990 - |
Information
Published : 2007-05-02 19:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1337
Mitre link : CVE-2007-1337
CVE.ORG link : CVE-2007-1337
JSON object : View
Products Affected
vmware
- workstation
CWE