The virtual machine process (VMX) in VMware Workstation before 5.5.4 does not properly read state information when moving from the ACPI sleep state to the run state, which allows attackers to cause a denial of service (virtual machine reboot) via unknown vectors.
osvdb.org/35508
secunia.com/advisories/25079
www.securityfocus.com/archive/1/467936/30/6690/threaded
www.securityfocus.com/archive/1/469011/30/6510/threaded
www.securityfocus.com/bid/23732
www.securitytracker.com/id?1018011
www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554
www.vupen.com/english/advisories/2007/1592
exchange.xforce.ibmcloud.com/vulnerabilities/33990