ID CVE-2009-1244
Summary Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 30-10-2018 - 16:25)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:S/C:C/I:C/A:C
oval via4
accepted 2009-11-09T04:00:34.291-05:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
definition_extensions
  • comment VMWare ESX Server 3.0.3 is installed
    oval oval:org.mitre.oval:def:6026
  • comment VMWare ESX Server 3.0.2 is installed
    oval oval:org.mitre.oval:def:5613
  • comment VMware ESX Server 3.5.0 is installed
    oval oval:org.mitre.oval:def:5887
description Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
family unix
id oval:org.mitre.oval:def:6065
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title VMware Multiple Hosted Products Display Function Code Execution Vulnerability
version 4
refmap via4
bid 34471
bugtraq 20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability
confirm http://www.vmware.com/security/advisories/VMSA-2009-0006.html
gentoo GLSA-201209-25
mlist [security-announce] 20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability
osvdb 53634
sectrack 1022031
vupen ADV-2009-0944
xf vmware-virtualmachine-code-execution(49834)
Last major update 30-10-2018 - 16:25
Published 13-04-2009 - 16:30
Last modified 30-10-2018 - 16:25
Back to Top