Vulnerability CVE-2008-4916


Published: 2009-04-06   Modified: 2012-02-12

Description:
Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.

Vendor: Vmware
Product: Vmware workstation 
Version:
6.5.1
6.5
6.03
6.0.5
6.0.4
6.0.3
6.0.2
6.0.1
6.0.0.45731
6.0
5.5.8
5.5.7
5.5.6
5.5.5
5.5.4
5.5.3
5.5.2
5.5.1
5.5.0
5.0
4.5.3
Product: Vmware esxi 
Version: 3.5;
Product: Vmware esx 
Version:
3.5
3.0.3
3.0.2
Product: Vmware player 
Version:
2.5.1
2.5
2.0.5
2.0.4
2.0.3
2.0.2
2.0.1
2.0
1.05
1.01
1.0.9
1.0.8
1.0.7
1.0.6
1.0.5
1.0.4
1.0.3
1.0.2
1.0.1
1.0.0
Product: Vmware ace 
Version:
2.5.1
2.5
2.0.5
2.0.3
2.0.2
2.0.1
1.0.8
1.0.7
1.0.5
1.0.4
1.0.3
1.0.2
1.0
Product: Vmware server 
Version:
2.0
1.05
1.0.7
1.0.6
1.0.5
1.0.4
1.0.3
1.0.2
1.0.1
1.0.0
1.0
Vendor: EMC
Product: Vmware player 

CVSS2 => (AV:L/AC:L/Au:S/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.9/10
3.1/10
Exploit range
Attack complexity
Authentication
Local
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete

 References:
http://www.vupen.com/english/advisories/2009/0944
http://www.vmware.com/security/advisories/VMSA-2009-0005.html
http://www.securitytracker.com/id?1021973
http://www.securityfocus.com/bid/34373
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://seclists.org/fulldisclosure/2009/Apr/0036.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6439
http://lists.vmware.com/pipermail/security-announce/2009/000054.html

Related CVE
CVE-2018-15769
RSA BSAFE Micro Edition Suite versions prior to 4.0.11 (in 4.0.x series) and versions prior to 4.1.6.2 (in 4.1.x series) contain a key management error issue. A malicious TLS server could potentially cause a Denial Of Service (DoS) on TLS clients dur...
CVE-2018-11080
Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains Improper File Permission Vulnerabilities. The application contains multiple configuration files with world-readable permissions that could allow an authenticated malicious user t...
CVE-2018-11079
Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains a Plaintext Password Storage vulnerability. Database credentials are stored in plaintext in a configuration file. An authenticated malicious user with access to the configuration...
CVE-2018-15764
Dell EMC ESRS Policy Manager versions 6.8 and prior contain a remote code execution vulnerability due to improper configurations of triggered JMX services. A remote unauthenticated attacker may potentially exploit this vulnerability to execute arbitr...
CVE-2018-11058
RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition, version prior to 4.0.5.3 (in 4.0.x) contain a Buffer Over-Read vulnerability when parsing ASN.1 data. A remote att...
CVE-2018-11070
RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover ...
CVE-2018-11069
RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key.
CVE-2018-11068
RSA BSAFE SSL-J versions prior to 6.2.4 contain a Heap Inspection vulnerability that could allow an attacker with physical access to the system to recover sensitive key material.

Copyright 2019, cxsecurity.com

 

Back to Top