4 Oct. 2008
Summary
By exploiting the VMware flaw described in this document, user-mode code executing in a virtual machine may gain kernel privileges within the virtual machine, dependent upon the guest operating system. The flaw has been proven exploitable on x64 versions of Windows, and it has produced potentially exploitable crashes on x64 versions of *BSD. The Linux kernel does not allow exploitation of the flaws on x64 versions of Linux.
Credit:
The information has been provided by Derek Soeder.
http://www.securiteam.com/securitynews/6V00115MUE.html
VMware Advisories and Patches
Published: 2008-10-04,
Last Updated: 2008-10-04 14:09:17 UTC
by Marcus Sachs (Version: 3)
VMware released the following new and updated security advisories on October 4th:
- VMSA-2008-0016 (new advisory)
http://www.vmware.com/security/advisories/VMSA-2008-0016.html (link is not live yet)
http://lists.vmware.com/pipermail/security-announce/2008/000037.html
- VMSA-2008-0014.2 (updated advisory)
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
http://lists.vmware.com/pipermail/security-announce/2008/000038.html
More: http://isc.sans.org/

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic