ID CVE-2007-0063
Summary Integer underflow in the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed DHCP packet that triggers a stack-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 16-07-2019 - 12:20)
Impact:
Exploitability:
CWE CWE-191
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
redhat via4
rpms dhcp-1:2.0pl5-11
refmap via4
bid 25729
confirm
fulldisc 20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player
gentoo GLSA-200711-23
iss 20070919 VMWare DHCP Server Remote Code Execution Vulnerabilities
sectrack 1018717
secunia
  • 26890
  • 27694
  • 27706
ubuntu USN-543-1
vupen ADV-2007-3229
xf dhcp-param-underflow(33103)
statements via4
contributor Mark J Cox
lastmodified 2008-06-03
organization Red Hat
statement This issue is the same as CVE-2007-5365. The affected dhcp versions were fixed via: https://rhn.redhat.com/errata/RHSA-2007-0970.html
Last major update 16-07-2019 - 12:20
Published 21-09-2007 - 19:17
Last modified 16-07-2019 - 12:20
Back to Top