ID CVE-2009-0177
Summary vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:*:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:*:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-10-2017 - 01:30)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2009-11-09T04:00:59.620-05:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
definition_extensions
  • comment VMWare ESX Server 3.0.3 is installed
    oval oval:org.mitre.oval:def:6026
  • comment VMWare ESX Server 3.0.2 is installed
    oval oval:org.mitre.oval:def:5613
  • comment VMware ESX Server 3.5.0 is installed
    oval oval:org.mitre.oval:def:5887
description vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command.
family unix
id oval:org.mitre.oval:def:6433
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title VMware authd Service Lets Remote Users Deny Service
version 4
refmap via4
bid 34373
confirm http://www.vmware.com/security/advisories/VMSA-2009-0005.html
exploit-db 7647
fulldisc 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues
mlist [security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues
osvdb 51180
sectrack 1021512
secunia
  • 33372
  • 34601
vupen
  • ADV-2009-0024
  • ADV-2009-0944
Last major update 19-10-2017 - 01:30
Published 20-01-2009 - 16:00
Last modified 19-10-2017 - 01:30
Back to Top