VMware Player 5.x < 5.0.1 VMX Process DoS (VMSA-2014-0001)

Low Nessus Plugin ID 72038


The remote host has a virtualization application that is affected by a denial of service vulnerability.


The installed version of VMware Player 5.x running on the remote Windows host is a version prior to 5.0.1. It is, therefore, reportedly affected by a denial of service vulnerability due to an issue with handling invalid ports that could allow a guest user to crash the VMX process.


Update to VMware Player 5.0.1 or later.

Plugin Details

Severity: Low

ID: 72038

File Name: vmware_player_dos_vmsa_2014_0001.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2014/01/20

Modified: 2014/07/19

Dependencies: 31728

Risk Information

Risk Factor: Low


Base Score: 2.1

Temporal Score: 1.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:player

Required KB Items: SMB/Registry/Enumerated, VMware/Player/Path, VMware/Player/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/11/06

Vulnerability Publication Date: 2014/01/16

Reference Information

CVE: CVE-2014-1208

BID: 64994

OSVDB: 102197

VMSA: 2014-0001