ID CVE-2008-4917
Summary Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 02-11-2018 - 13:44)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
oval via4
accepted 2010-05-17T04:00:12.756-04:00
class vulnerability
contributors
  • name Michael Wood
    organization Hewlett-Packard
  • name Michael Wood
    organization Hewlett-Packard
  • name J. Daniel Brown
    organization DTCC
definition_extensions
  • comment VMWare ESX Server 3.0.3 is installed
    oval oval:org.mitre.oval:def:6026
  • comment VMWare ESX Server 3.0.2 is installed
    oval oval:org.mitre.oval:def:5613
  • comment VMware ESX Server 3.5.0 is installed
    oval oval:org.mitre.oval:def:5887
description Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption.
family unix
id oval:org.mitre.oval:def:6246
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title VMware ESX Virtual Hardware Memory Access Bug Lets Local Users Gain Elevated Privileges
version 6
refmap via4
bid 32597
bugtraq
  • 20081203 Re: VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2
  • 20081203 VMSA-2008-0019 VMware Hosted products and patches for ESX and ESXi resolve a critical security issue and update bzip2
confirm
gentoo GLSA-201209-25
sectrack
  • 1021300
  • 1021301
secunia 32965
Last major update 02-11-2018 - 13:44
Published 09-12-2008 - 00:30
Last modified 02-11-2018 - 13:44
Back to Top