FYI...
VMSA-2010-0004 - VMware ESX Servers...
-
http://www.vmware.co...-2010-0004.html
-
http://secunia.com/advisories/38833/
Release Date: 2010-03-04
Criticality level: Moderately critical
Impact: Security Bypass, DoS, System access
Where: From remote
Solution Status: Vendor Patch
Operating System: VMware ESX Server 4.x
Solution: Apply ESX400-201002404-SG, ESX400-201002407-SG, and ESX400-201002406-SG:
Original Advisory: VMSA-2010-0004:
http://lists.vmware....010/000082.html
-
http://secunia.com/advisories/38794/
Release Date: 2010-03-04
Criticality level: Moderately critical
Impact: Security Bypass, Spoofing, Exposure of sensitive information, Privilege escalation, DoS, System access
Where: From remote
Solution Status: Vendor Patch
Software: VMware vMA 4.x
Solution: Apply vMA 4.0 Patch 3.
Original Advisory: VMSA-2010-0004:
http://lists.vmware....010/000082.html
-
http://secunia.com/advisories/38834/
Release Date: 2010-03-04
Criticality level: Less critical
Impact: Spoofing, Exposure of sensitive information, Privilege escalation, DoS
Where: From local network
Solution Status: Unpatched
Operating System: VMware ESX Server 4.x
Original Advisory: VMSA-2010-0004:
http://lists.vmware....010/000082.html
Mar 3, 2010 - "... table lists what action remediates the vulnerability..."
-
http://secunia.com/advisories/38832/
Release Date: 2010-03-04
Criticality level: Less critical
Impact: DoS
Where: From local network
Solution Status: Unpatched
Operating System: VMware ESX Server 2.x, VMware ESX Server 3.x
Solution: Restrict network access to trusted users only.
Original Advisory: VMSA-2010-0004:
http://lists.vmware....010/000082.html
-
http://lists.vmware....10/subject.html
Edited by AplusWebMaster, 06 March 2010 - 05:27 PM.