Vulnerability CVE-2008-3892


Published: 2008-09-03   Modified: 2012-02-12

Description:
Buffer overflow in a certain ActiveX control in the COM API in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a call to the GuestInfo method in which there is a long string argument, and an assignment of a long string value to the result of this call. NOTE: this may overlap CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, or CVE-2008-3696.

See advisories in our WLB2 database:
Topic
Author
Date
High
VMware * address information disclosure, privilege escalation and other security issues.
VMware Security ...
03.09.2008

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Vmware -> ACE 
Vmware -> Player 
Vmware -> Server 
Vmware -> Vmware player 
Vmware -> Vmware server 
Vmware -> Vmware workstation 
Vmware -> Workstation 

 References:
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
http://securityreason.com/securityalert/4202
http://www.securityfocus.com/archive/1/495869/100/0/threaded
http://www.securityfocus.com/bid/29503
http://www.securityfocus.com/bid/30934
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/server/doc/releasenotes_server.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/2466
https://exchange.xforce.ibmcloud.com/vulnerabilities/43062
https://www.exploit-db.com/exploits/6345

Copyright 2024, cxsecurity.com

 

Back to Top