mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
192 lines
6.3 KiB
JSON
192 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2009-0908",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-04-06T15:30:04.360",
|
|
"lastModified": "2017-09-29T01:34:05.200",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the ACE shared folders implementation in the VMware Host Guest File System (HGFS) shared folders feature in VMware ACE 2.5.1 and earlier allows attackers to enable a disabled shared folder."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad no especificada en la implementaci\u00f3n de la carpeta en VMware Host Guest File System (HGFS) caracter\u00edstica de carpeta compartida en VMware ACE v2.5.1 y anteriores que permiten a lo atacantes deshabilitar las carpetas compartidas."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.4
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.5.1",
|
|
"matchCriteriaId": "8D249F86-E463-4AB1-BEEE-0828D5A2D761"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "700C0BB4-2272-4405-9D9A-A636E3D22461"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFC82A8C-E561-4E35-A84D-66A4D6C90264"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D346E48-887C-4D02-BFD3-D323B7F3871C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9C6150A-2DF3-4F7B-B024-0F3DBB686124"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40192EE1-A300-42C3-BC98-286C9E5A281E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87291B27-442C-4CAB-94A1-67FC766486EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C4B04862-4377-422E-931A-B17FE1CA1884"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C35B6730-F05B-4B62-B4DE-07C61A4924F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8E1A5AA-BD9F-4263-B7C6-E744323C4D74"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D22E40D-C362-49FD-924C-262A64555934"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A48CEB4-5864-4A0F-B14C-CFE4699C3311"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78957047-FB9F-4D1D-B3D9-91257A6B4D7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A04DB52-C66C-4AA9-9D6F-9D2DC202C5C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "280033C5-90EF-4825-A87D-B23650D8C71A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/34373",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1021975",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/0944",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6399",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |