VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091030-001
VMware hosted products and ESX patches resolve two security issues
http://lists.vmware.com/pipermail/security-announce/2009/000069.html

VMware hosted products and ESX patches resolve two security issues.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-10-30
Source Information Category:
Advisory, Alert
Last Updated:
2009-10-30




Affected Product Tags
cpe:/a:vmware:ace     (VMWare ACE)
cpe:/a:vmware:esx_server     (VMWare ESX Server)
cpe:/a:vmware:player     (VMWare Player)
cpe:/a:vmware:server     (VMWare VMware Server)
cpe:/a:vmware:workstation     (VMWare VMWare)
lapt:/a:vmware:esxi     (VMware ESXi)
lapt:/a:vmware:fusion     (VMware Fusion)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
X Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
X Non-routed [?]
Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

Simple [?]
X None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
X None [?]

Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.