Heads up. A new VMWare vulnerability security advisory has been released.
Problem Description
a. VMware host memory overwrite vulnerability (data pointers)
Due to a flaw in the handler function for RPC commands, it is possible to manipulate data pointers within the VMX process. This vulnerability may allow a guest user to crash the VMX process or potentially execute code on the host.Workaround
Configure virtual machines to use less than 4 GB of memory. Virtual machines that have less than 4GB of memory are not affected.
Mitigation
Do not allow untrusted users access to your virtual machines. Root or Administrator level permissions are not required to exploit this issue.
Source: Article Link