CVE-2009-1146
Vulnerability from cvelistv5
Published
2009-04-06 15:00
Modified
2024-08-07 05:04
Severity ?
Summary
Unspecified vulnerability in an ioctl in hcmon.sys in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 1.0.x before 1.0.9 build 156507 and 2.0.x before 2.0.1 build 156745 allows local users to cause a denial of service via unknown vectors, a different vulnerability than CVE-2008-3761.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:04:48.352Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
          },
          {
            "name": "34373",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34373"
          },
          {
            "name": "oval:org.mitre.oval:def:6310",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6310"
          },
          {
            "name": "ADV-2009-0944",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0944"
          },
          {
            "name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
          },
          {
            "name": "1021977",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021977"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in an ioctl in hcmon.sys in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 1.0.x before 1.0.9 build 156507 and 2.0.x before 2.0.1 build 156745 allows local users to cause a denial of service via unknown vectors, a different vulnerability than CVE-2008-3761."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
        },
        {
          "name": "34373",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34373"
        },
        {
          "name": "oval:org.mitre.oval:def:6310",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6310"
        },
        {
          "name": "ADV-2009-0944",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0944"
        },
        {
          "name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
        },
        {
          "name": "1021977",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021977"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1146",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in an ioctl in hcmon.sys in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 1.0.x before 1.0.9 build 156507 and 2.0.x before 2.0.1 build 156745 allows local users to cause a denial of service via unknown vectors, a different vulnerability than CVE-2008-3761."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
            },
            {
              "name": "34373",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34373"
            },
            {
              "name": "oval:org.mitre.oval:def:6310",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6310"
            },
            {
              "name": "ADV-2009-0944",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0944"
            },
            {
              "name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
              "refsource": "MLIST",
              "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
            },
            {
              "name": "1021977",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021977"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1146",
    "datePublished": "2009-04-06T15:00:00",
    "dateReserved": "2009-03-25T00:00:00",
    "dateUpdated": "2024-08-07T05:04:48.352Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-1146\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-04-06T15:30:04.420\",\"lastModified\":\"2024-11-21T01:01:46.443\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in an ioctl in hcmon.sys in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 1.0.x before 1.0.9 build 156507 and 2.0.x before 2.0.1 build 156745 allows local users to cause a denial of service via unknown vectors, a different vulnerability than CVE-2008-3761.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en un ioctl de hcmon.sys de VMware Workstation v6.5.1 y anteriores, VMware Player v2.5.1 y anteriores, VMware ACE v2.5.1 y anteriores y VMware Server en sus versiones v1.0.x anteriores a v1.0.9 build 156507 y v2.0.x en sus versiones anteriores a v2.0.1 build 156745. Permite a usuarios locales provocar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de vectores de ataque desconocidos utilizando una vulnerabilidad distinta a la especificada en CVE-2008-3761.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5.1\",\"matchCriteriaId\":\"8D249F86-E463-4AB1-BEEE-0828D5A2D761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700C0BB4-2272-4405-9D9A-A636E3D22461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC82A8C-E561-4E35-A84D-66A4D6C90264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D346E48-887C-4D02-BFD3-D323B7F3871C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9C6150A-2DF3-4F7B-B024-0F3DBB686124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40192EE1-A300-42C3-BC98-286C9E5A281E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87291B27-442C-4CAB-94A1-67FC766486EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B04862-4377-422E-931A-B17FE1CA1884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B6730-F05B-4B62-B4DE-07C61A4924F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E1A5AA-BD9F-4263-B7C6-E744323C4D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D22E40D-C362-49FD-924C-262A64555934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A48CEB4-5864-4A0F-B14C-CFE4699C3311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78957047-FB9F-4D1D-B3D9-91257A6B4D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A04DB52-C66C-4AA9-9D6F-9D2DC202C5C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280033C5-90EF-4825-A87D-B23650D8C71A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71537AE-346D-4BA9-90E7-EA0AB0CD0886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5.1\",\"matchCriteriaId\":\"BC1C154A-3869-4189-A781-D3071D54143F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E76D03A3-DB55-48A2-B5A5-64002D28B95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EAC68CA-DCA3-4399-807D-E7AC67C9C3E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B13A58-1876-4322-AC25-107D43BABD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D04A928-4421-4BEE-9500-7398E4DB929B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088450C4-9C6F-4651-8D59-C36F1B0601BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA35C066-90A9-4DE2-A97A-38A6CFC59A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462EEAD5-A78C-4381-847E-B6F1BE4CB379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E666A5E4-4CDD-4915-B0F3-C63998D01846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7AD12A-26C9-48AD-A32A-0F56545DF8E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73C45BB0-C0DB-42B8-A238-B81D836CF91E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297226F7-05CB-4721-9D02-51FE2919D2DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3F9D4D-2116-49A7-9292-AF6B4456E175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2EAA90-B24A-45E7-B99F-DA3554A16F92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"446F2959-C42B-403B-AE1C-BA7D305C60CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE944A70-CB9C-4712-9802-509531396A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73EC33AB-E92A-4AA8-A523-C341133BB515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53197903-0614-4460-8944-C1B5257D71A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F037B05F-6F92-4BE1-B672-F677CBEFD075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8DD6D27-1335-44EF-8B69-A9163A67BC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BFEAE8-0118-4548-A6EA-E90FA8FE7AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42049891-38B7-4BB7-8DA5-A87169E2D958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07139DF7-C36B-4FED-8558-7FA49BE0BCFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0D7307-5946-45DC-88D3-6BC72EF50184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89699BB6-9E41-41DC-B597-B45CA05313A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2786E370-6108-4695-B0A8-9F19D8E3C0C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.5.1\",\"matchCriteriaId\":\"E4D69FD9-F162-4623-A475-9FA7A3A6DF30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBF029A-103D-4BB6-B037-25EC2224DF34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D00C4D90-3697-4F3F-8FFF-FE63F3AD0DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A717A5-60C2-4470-943E-CA53781D4B14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8FBC02-7F2F-4AEF-A5A3-E283D192937C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29AA2B37-BF5F-4AC5-844D-34CF56EC621C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07131E56-53EE-4CE1-A135-050792EA3C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86334051-8763-4CD9-9480-CAEAE756DFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66596F04-9C2E-4091-85A7-40239F3F920E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E831531-60FE-4DFC-994E-7409E6C69D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C1A275E-2152-4A37-8CFE-34E8900E3426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7A688A2-3E9C-4AA3-832B-300A5A311C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89098CFF-4696-4BD9-9BC9-D7C2D92FE729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30DFFE7-EB73-4A88-A23B-9B386C091314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6C230D-7BAA-4A77-9E96-B1B994F4AAC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0FE7C5-2C46-4B59-9242-A03B986C07DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37595A89-52C5-4699-A463-C9D91B91716B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"294B621F-6C1A-4571-AE13-49495680D255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF51A7F-59DA-4F64-A4F7-3A250C950D0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA47458-E783-4A6A-ABF1-59E8D87E9B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16A1141D-9718-4A22-8FF2-AEAD28E07291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75ED54E-8E55-48BF-A52E-19FCCE895C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53297E3-0C74-421B-8058-DAF7357D421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACDEFCEF-F943-449B-91D8-A8CB290C7AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97957D6F-0249-4814-8755-5C4537B58E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89329F80-7134-4AB2-BDA3-E1B887F633B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4408849A-21F1-40F5-A528-0BD47E1BF823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9938CB4F-96D1-4852-9694-28A93E13AA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB61760-87FD-4E60-ADC6-407EFA13773C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBDE6D5-7131-421A-BABE-32F281615597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AA4FEF-FF8F-4706-89BC-8396F7614EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC6B629-30B3-4C45-B5E9-1B4310F186FD\"}]}]}],\"references\":[{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2009/000054.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2009/Apr/0036.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/34373\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021977\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0944\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6310\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2009/000054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2009/Apr/0036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/34373\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.