The vulnerability described in this document could hypothetically be exploited by unprivileged code running in a VMware virtual machine (guest) in order to execute code in the host VMX process, thereby breaking out of the virtual machine; however, such exploitation has not been proven.
6b511360ce2598e1deb986ad52df1981db6e70d11d4357b2353ea14c01410c67