The vulnerability described in this document could hypothetically be exploited by unprivileged code running in a VMware virtual machine (guest) in order to execute code in the host VMX process, thereby breaking out of the virtual machine; however, such exploitation has not been proven.
6b511360ce2598e1deb986ad52df1981db6e70d11d4357b2353ea14c01410c67
VMware Security Advisory 2012-0009 - VMware Workstation, Player, ESXi and ESX patches address critical security issues.
eb075b48375e4e244ac290d95f092560fec992c243117c80698f4db787b4f60a