mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
132 lines
5.2 KiB
JSON
132 lines
5.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2008-1363",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for \"hijacking the VMX process.\""
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "vmware-config-privilege-escalation(41252)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41252"
|
|
},
|
|
{
|
|
"name": "GLSA-201209-25",
|
|
"refsource": "GENTOO",
|
|
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
|
|
},
|
|
{
|
|
"name": "3755",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/3755"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
|
|
},
|
|
{
|
|
"name": "1019622",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1019622"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
|
|
},
|
|
{
|
|
"name": "20080318 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "[security-announce] 20080317 VMSA-2008-0005 Updated VMware Workstation, VMware Player, VMware Server, VMware ACE, and VMware Fusion resolve critical security issues",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
|
|
},
|
|
{
|
|
"name": "ADV-2008-0905",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2008/0905/references"
|
|
},
|
|
{
|
|
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html"
|
|
},
|
|
{
|
|
"name": "28276",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/28276"
|
|
}
|
|
]
|
|
}
|
|
} |