René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

297 lines
10 KiB
JSON

{
"id": "CVE-2008-1361",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-20T00:44:00.000",
"lastModified": "2018-10-11T20:32:00.730",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362."
},
{
"lang": "es",
"value": "VMware Workstation versiones 6.0.x anteriores a 6.0.3 y 5.5.x anteriores a 5.5.6, VMware Player versiones 2.0.x anteriores a 2.0.3 y 1.0.x anteriores a 1.0.6, VMware ACE versiones 2.0.x anteriores a 2.0.1 y 1.0.x anteriores a 1.0.5, y VMware Server versiones 1.0.x anteriores a 1.0.5 para Windows permite a usuarios locales conseguir privilegios mediante una manipulaci\u00f3n no espec\u00edfica que causa que el proceso authd conecte con un nombre de tuber\u00eda de su elecci\u00f3n, siendo una vulnerabilidad diferente que CVE-2008-1362."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC82A8C-E561-4E35-A84D-66A4D6C90264"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D346E48-887C-4D02-BFD3-D323B7F3871C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C6150A-2DF3-4F7B-B024-0F3DBB686124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "40192EE1-A300-42C3-BC98-286C9E5A281E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E1A5AA-BD9F-4263-B7C6-E744323C4D74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "47B13A58-1876-4322-AC25-107D43BABD2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6D04A928-4421-4BEE-9500-7398E4DB929B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "088450C4-9C6F-4651-8D59-C36F1B0601BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F7AD12A-26C9-48AD-A32A-0F56545DF8E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73C45BB0-C0DB-42B8-A238-B81D836CF91E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "297226F7-05CB-4721-9D02-51FE2919D2DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DD6D27-1335-44EF-8B69-A9163A67BC2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8230EFE6-8AB6-41DF-9A46-CAE4E5BB7F2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2C792F-48DA-46B5-B42E-9A045B393531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6968BBA4-3A55-4495-ACB2-6F7535EBEAF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA04700-CF35-43CA-AD4E-BB93E206FDD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FFF35E-DCFC-4C13-8C5A-7CE80A161370"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBD26B9-60A6-4D6B-B031-0DA8A9F3323F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B7632A4-D120-434D-B35A-303640DB37AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6DFFE01E-BD0A-432E-B47C-D68DAADDD075"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*",
"matchCriteriaId": "51C6D608-64DE-4CC4-9869-3342E8FD707F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*",
"matchCriteriaId": "DDEAB605-03F6-4968-8A48-126C7C711043"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "16A1141D-9718-4A22-8FF2-AEAD28E07291"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2ADE72-4F19-4E73-AC3E-7038FE0D38B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89329F80-7134-4AB2-BDA3-E1B887F633B0"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000008.html",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/3755",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1019621",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/489739/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/28276",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0005.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/0905/references",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41257",
"source": "cve@mitre.org"
}
]
}