CVE-2007-5671
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
05/06/2008
Last modified:
30/10/2018
Description
HGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges.
Impact
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712
- http://secunia.com/advisories/30556
- http://security.gentoo.org/glsa/glsa-201209-25.xml
- http://securityreason.com/securityalert/3922
- http://securitytracker.com/id?1020197=
- http://www.securityfocus.com/archive/1/493080/100/0/threaded
- http://www.securityfocus.com/archive/1/493148/100/0/threaded
- http://www.securityfocus.com/archive/1/493172/100/0/threaded
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- http://www.vupen.com/english/advisories/2008/1744
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688