CVE-2007-5438
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/10/2007
Last modified:
09/04/2025
Description
Unspecified vulnerability in a certain ActiveX control in Reconfig.DLL in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 might allow local users to cause a denial of service to the Virtual Disk Mount Service (vmount2.exe), related to the ConnectPopulatedDiskEx function.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
- http://osvdb.org/43488
- http://secunia.com/advisories/31707
- http://secunia.com/advisories/31708
- http://secunia.com/advisories/31709
- http://secunia.com/advisories/31710
- http://securityreason.com/securityalert/3219
- http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
- http://www.securityfocus.com/archive/1/482021/100/0/threaded
- http://www.securityfocus.com/archive/1/495869/100/0/threaded
- http://www.securityfocus.com/bid/26025
- http://www.securitytracker.com/id?1020791=
- http://www.vmware.com/security/advisories/VMSA-2008-0014.html
- http://www.vmware.com/support/ace/doc/releasenotes_ace.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/server/doc/releasenotes_server.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2008/2466
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
- http://osvdb.org/43488
- http://secunia.com/advisories/31707
- http://secunia.com/advisories/31708
- http://secunia.com/advisories/31709
- http://secunia.com/advisories/31710
- http://securityreason.com/securityalert/3219
- http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
- http://www.securityfocus.com/archive/1/482021/100/0/threaded
- http://www.securityfocus.com/archive/1/495869/100/0/threaded
- http://www.securityfocus.com/bid/26025
- http://www.securitytracker.com/id?1020791=
- http://www.vmware.com/security/advisories/VMSA-2008-0014.html
- http://www.vmware.com/support/ace/doc/releasenotes_ace.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/server/doc/releasenotes_server.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2008/2466



