Knowledge Base

The VMware Knowledge Base provides support solutions, error messages and troubleshooting guides
 
Search the VMware Knowledge Base (KB)   View by Article ID
 

Security Response to CERT 412115: AMD PCNet Windows Driver Security Vulnerabilites (1437)

Details

A network security scan or report indicates that the Windows driver for the virtual NIC in my guest operating system may have a buffer vulnerability. An overview of this vulnerability is published by cert.org at www.kb.cert.org/vuls/id/412115 and also appears on the BugTraq mailing list at www.securityfocus.com/archive/1/324300. The virtual machine is configured to use a virtual NIC that appears to the operating system as an AMD PCNet adapter (vlance). 

Solution

AMD reports that this vulnerabilitity has been fixed in version 4.51 of the NDIS5 Windows driver for the AMD PCNet family of network adapters. If you need to use the AMD PCNet family of network adapters, contact AMD for an updated driver.
 
The vmxnet driver for Windows does not have this vulnerability. This driver is included with VMware Tools.
 
For a list of guest operating systems that VMware has vmxnet drivers for, see Which Guests Have the vmxnet Driver? (1435).

Keywords

1437; 1036; URLZ; adaptor; leak; DOS; attack; alertz; etherleak; bugtraq; 324300; amd.com

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 4 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.
What can we do to improve this information? (4000 or fewer characters)
  • 4 Ratings
Actions
KB: