| Summary: | app-emulation/vmware-player, vmware-workstation: Shared Folders Directory Traversal (CVE-2008-0923) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | minor | CC: | vmware+disabled |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.coresecurity.com/?action=item&id=2129 | ||
| Whiteboard: | B3 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Robert Buchholz (RETIRED)
2008-02-26 22:43:20 UTC
Upstream failed to provide an update to their products since November, now this is public. We can either mask, wait, or send an advisory with the "disable shared folder" workaround. Good news: Vmware upstream states that only windows-hosted machines are affected, i.e. not an issue for us. Thanks to nion for pointing that out for me. http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034 |