The virtual machine process (VMX) in VMware Workstation before 5.5.4 does not properly read state information when moving from the ACPI sleep state to the run state, which allows attackers to cause a denial of service (virtual machine reboot) via unknown vectors.
https://exchange.xforce.ibmcloud.com/vulnerabilities/33990
http://www.vupen.com/english/advisories/2007/1592
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html#554
http://www.securitytracker.com/id?1018011
http://www.securityfocus.com/bid/23732
http://www.securityfocus.com/archive/1/469011/30/6510/threaded
http://www.securityfocus.com/archive/1/467936/30/6690/threaded