2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2009-2267" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2009-11-02T15:30:00.420" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T01:04:29.320" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register."
} ,
{
"lang" : "es" ,
"value" : "VMware Workstation v6.5.x anteriores a v6.5.3 build 185404, VMware Player v2.5.x anteriores a v2.5.3 build 185404, VMware ACE v2.5.x anteriores a v2.5.3 build 185404, VMware Server v1.x anteriores a v1.0.10 build 203137 and v2.x anteriores a v2.0.2 build 203138, VMware Fusion v2.x anteriores a v2.0.6 build 196839, VMware ESXi v3.5 y v4.0, y VMware ESX v2.5.5, v3.0.3, v3.5 y v4.0, cuando el modo Virtual-8086 es usado, no asigna adecuadamente el c\u00f3digo de excepci\u00f3n para una excepci\u00f3n de fallo de p\u00e1gina (tambi\u00e9n conocido como #PF), lo que permite a usuarios del SO anfitri\u00f3n obtener privilegios en el SO anfitri\u00f3n especificando un valor modificado para el registro cs."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:M/Au:N/C:C/I:C/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.9 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.4 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B71537AE-346D-4BA9-90E7-EA0AB0CD0886"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5674C3DD-F510-4701-ACA8-437576307528"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E62960B2-91AE-4DD7-8085-9BA6BCB84473"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:esx:2.5.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B037838B-072E-4676-9E5D-86F5BC207512"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B6F7416-E694-4EC9-9FE5-0C24448ECB34"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE5ECA1B-7415-4390-8018-670F2C3CDF35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "889DE9BE-886F-4BEF-A794-5B5DE73D2322"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD59C463-F352-4F6C-853F-415E3FB4ABDD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E18541B-36B6-40A7-9749-FA47A10379C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6DA47C9-3D1A-49A7-8976-AE05D6730673"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "692CC131-5C6C-4AD6-B85C-07DF21168BC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "617EFBFF-D047-4A0B-ACB6-83B27710F6F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1D0DF91-17E8-45D4-B625-737FE50C23CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE944A70-CB9C-4712-9802-509531396A02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "62DA49FA-6657-45B5-BF69-D3A03BA62A4D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "73EC33AB-E92A-4AA8-A523-C341133BB515"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53197903-0614-4460-8944-C1B5257D71A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F037B05F-6F92-4BE1-B672-F677CBEFD075"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8DD6D27-1335-44EF-8B69-A9163A67BC2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6BFEAE8-0118-4548-A6EA-E90FA8FE7AF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42049891-38B7-4BB7-8DA5-A87169E2D958"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07139DF7-C36B-4FED-8558-7FA49BE0BCFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E0D7307-5946-45DC-88D3-6BC72EF50184"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "89699BB6-9E41-41DC-B597-B45CA05313A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C9D09AC-7D9B-4150-86BC-19F44F6F2CA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2786E370-6108-4695-B0A8-9F19D8E3C0C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:2.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C2AAA6D-A31D-43A7-AB2F-FBF9815A9745"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6CFDD84-A482-42C2-B43F-839F4D7F1130"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3E658DA-56E8-49F0-B486-4EF622B63627"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "541D77A2-99C5-4CDB-877F-7E83E1E3369E"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/37172" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.gentoo.org/glsa/glsa-201209-25.xml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1023082" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1023083" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/507523/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/507539/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/36841" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3062" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/37172" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://security.gentoo.org/glsa/glsa-201209-25.xml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1023082" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1023083" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/507523/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/507539/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/36841" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2009/3062" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}