VMWare Released a new security advisory (VMSA-2012-0011) for its products . The advisory covers pretty much all of VMWare's virtualization platforms (Player, Workstation, Fusions, ESX and ESXi).
The in my opinion most severe vulnerability out of the two described would allow an attacker to execute code on the remote host, which could be used to "break out" of the guest. However, this issue requires that the attacker is able to load checkpoint files on the guest, which in turn requires the attacker to have full control of the guest, a typical requirement for VMWare escape.
The second vulnerability can lead to a denial of service. An attacker can crash the virtual machine by manipulating traffic to remote devices like keyboards or disks attached to the virtual machine.
I would not consider either one of these as "super critical", but in particular the first issue should be patched soon.
 http://www.vmware.com/security/advisories/VMSA-2012-0011.htmlIntrusion Detection In-Depth - SANS Las Vegas Spring 2020
Jun 14th 2012
7 years ago