ESX, VI Clients, and VMware products update address multiple vulnerabilities

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

a. VMware vmkernel third party e1000 Driver Packet Filter Bypass

There is an issue in the e1000 Linux driver for Intel PRO/1000 adapters
that allows a remote attacker to bypass packet filters.

b. ESX third party update for Service Console kernel

IPv4 Remote Denial of Service An remote attacker can achieve a denial of
service via an issue in the kernel IPv4 code.

SCSI Driver Denial of Service / Possible Privilege Escalation A local
attacker can achieve a denial of service and possibly a privilege
escalation via a vulnerability in the Linux SCSI drivers.

Kernel Memory Management Arbitrary Code Execution A context-dependent
attacker can execute arbitrary code via a vulnerability in a kernel
memory handling function.

c. Multiple vulnerabilities in mount.vmhgfs

Mount.vmhgfs Information Disclosure Information disclosure via a
vulnerability that allows an attacker with access to the Guest to
determine if a path exists in the Host filesystem and whether it is a
file or directory regardless of permissions.

Mount.vmhgfs Race Condition Privilege escalation via a race condition
that allows an attacker with access to the guest to mount on arbitrary
directories in the Guest filesystem and achieve privilege escalation if
they can control the contents of the mounted directory.

d. VI Client ActiveX vulnerabilities

VI Client COM objects can be instantiated in Internet Explorer which may
cause memory corruption. An attacker who succeeded in making the VI
Client user visit a malicious Web site could execute code on the user's
system within the security context of that user.

It is recommended that any affected software be updated as soon as
possible.