ID CVE-2009-1147
Summary Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 30-10-2018 - 16:26)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
oval via4
accepted 2009-11-09T04:00:17.917-05:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
definition_extensions
  • comment VMWare ESX Server 3.0.3 is installed
    oval oval:org.mitre.oval:def:6026
  • comment VMWare ESX Server 3.0.2 is installed
    oval oval:org.mitre.oval:def:5613
  • comment VMware ESX Server 3.5.0 is installed
    oval oval:org.mitre.oval:def:5887
description Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors.
family unix
id oval:org.mitre.oval:def:5471
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title VMware Windows 'vmci.sys' Driver Lets Local Users Gain Elevated Privileges
version 4
refmap via4
bid 34373
confirm http://www.vmware.com/security/advisories/VMSA-2009-0005.html
fulldisc 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues
mlist [security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues
sectrack 1021976
vupen ADV-2009-0944
Last major update 30-10-2018 - 16:26
Published 06-04-2009 - 15:30
Last modified 30-10-2018 - 16:26
Back to Top