ID CVE-2008-4916
Summary Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
    cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 29-09-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:S/C:N/I:N/A:C
oval via4
accepted 2009-11-09T04:01:00.222-05:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
definition_extensions
  • comment VMWare ESX Server 3.0.3 is installed
    oval oval:org.mitre.oval:def:6026
  • comment VMWare ESX Server 3.0.2 is installed
    oval oval:org.mitre.oval:def:5613
  • comment VMware ESX Server 3.5.0 is installed
    oval oval:org.mitre.oval:def:5887
description Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.
family unix
id oval:org.mitre.oval:def:6439
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title VMware Guest Virtual Device Driver Bug Lets Local Users Deny Service
version 4
refmap via4
bid 34373
confirm http://www.vmware.com/security/advisories/VMSA-2009-0005.html
fulldisc 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues
gentoo GLSA-201209-25
mlist [security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues
sectrack 1021973
vupen ADV-2009-0944
Last major update 29-09-2017 - 01:32
Published 06-04-2009 - 15:30
Last modified 29-09-2017 - 01:32
Back to Top