Heads up. A new VMWare vulnerability security advisory has been released.
a. VMware host memory overwrite vulnerability (data pointers)
Due to a flaw in the handler function for RPC commands, it is possible to manipulate data pointers within the VMX process. This vulnerability may allow a guest user to crash the VMX process or potentially execute code on the host.
Configure virtual machines to use less than 4 GB of memory. Virtual machines that have less than 4GB of memory are not affected.
Do not allow untrusted users access to your virtual machines. Root or Administrator level permissions are not required to exploit this issue.
Source: Article Link