lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <80115b6904112907451e9c3f15@mail.gmail.com>
From: reedarvin at gmail.com (Reed Arvin)
Subject: Format string flaw in VMWare Workstation 4.5.2 build-8848.

Summary:
Just a simple, low to no risk format string flaw in VMWare Workstation.

Details:
Running vmware.exe from the command line with certain arguments
produces a message box that contains various data stored in memory.

Vulnerable Versions:
VMWare Workstation 4.5.2 build-8848

Solutions:
The vendor was notified.  There was no response.

Exploit:
Run the following command from the command prompt:

vmware.exe %x%x%x%x

Discovered by Reed Arvin reedarvin[at]gmail[dot]com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ