Vulnerability CVE-2008-1361


Published: 2008-03-19   Modified: 2012-02-12

Description:
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362.

See advisories in our WLB2 database:
Topic
Author
Date
High
VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues
VMware Security ...
20.03.2008

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
10/10
3.1/10
Exploit range
Attack complexity
Authentication
Local
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Vmware -> ACE 
Vmware -> Player 
Vmware -> Server 
Vmware -> Vmware server 
Vmware -> Vmware workstation 
Vmware -> Workstation 

 References:
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://securityreason.com/securityalert/3755
http://securitytracker.com/id?1019621
http://www.securityfocus.com/archive/1/489739/100/0/threaded
http://www.securityfocus.com/bid/28276
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/server/doc/releasenotes_server.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/0905/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41257

Copyright 2021, cxsecurity.com

 

Back to Top