VMware Workstation Shared Folders Directory Traversal Vulnerability

To exploit this issue, an attacker must have access to a guest operating system on a vulnerable host and must issue commands via the affected application's Backdoor IO Protocol.

An attacker could use publicly available information to reverse-engineer the IO protocol used for communication between a guest and the host.


 

Privacy Statement
Copyright 2010, SecurityFocus