Release Date: 2008-11-07
Critical:
Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Vendor Patch
OS: VMware ESX Server 2.x
VMware ESX Server 3.x
VMware ESXi 3.x
Description:
Some vulnerabilities have been reported in VMware ESX and ESXi, which can be exploited by malicious, local users to gain escalated privileges.
Solution:
Update to the latest version or apply patches.
Provided and/or discovered by:
The vendor credits:
1) Derek Soeder
2) Michel Toussaint
Original Advisory:
VMSA-2008-0018:
http://lists.vmware.com/pipermail/security-announce/2008/000042.html
Other References:
SA32612:
http://secunia.com/advisories/32612/
CDRW-Taper "amlabel-cdrw" Insecure Temporary Files
Release Date: 2008-11-07
Critical:
Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Unpatched
Software: CDRW-Taper 0.x
Description:
A security issue has been reported in CDRW-Taper, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
The security issue is caused due to the "amlabel-cdrw" script using temporary files in an insecure manner. This can be exploited to e.g. overwrite or delete arbitrary files via symlink attacks.
The security issue is reported in version 0.4. Other versions may also be affected.
Solution:
Restrict local access to trusted users only.
Provided and/or discovered by:
Reported by Dmitry E. Oboukhov in a Debian bug report.
Original Advisory:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496380

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic