VMWARE PATCHES BUG THAT ALLOWS GUEST TO EXECUTE CODE ON HOST

cyber

Users who run four different types of VMware products, ESXi, vCenter Server, Fusion and Workstation, are being encouraged to update to address a series of vulnerabilities, one critical.

The most serious issue, an out-of-bounds write vulnerability, exists in ESXi, and desktop hypervisors Workstation, and Fusion. An attacker could exploit the issue, which exists in a SVGA device, to execute code on the host, according to a VMware security advisory posted early Friday.

To read the original article : https://threatpost.com/vmware-patches-bug-that-allows-guest-to-execute-code-on-host/127990/

Laisser un commentaire

Next Post

ADOBE FIXES EIGHT VULNERABILITIES IN FLASH, ROBOHELP, COLDFUSION

Adobe fixed eight vulnerabilities across three products, including two critical memory corruption bugs and a critical XML parsing flaw, with its regularly scheduled update on Tuesday. RoboHelp for Windows, ColdFusion, and as usual, Flash Player, all received updates as part of the company’s Patch Tuesday security bulletins. Versions 26.0.0.151 and […]