ID CVE-2009-1805
Summary Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:ace:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:ace:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:-:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 30-10-2018 - 16:26)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:H/Au:N/C:N/I:N/A:C
oval via4
accepted 2009-11-09T04:00:36.120-05:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
definition_extensions
  • comment VMWare ESX Server 3.0.3 is installed
    oval oval:org.mitre.oval:def:6026
  • comment VMWare ESX Server 3.0.2 is installed
    oval oval:org.mitre.oval:def:5613
  • comment VMware ESX Server 3.5.0 is installed
    oval oval:org.mitre.oval:def:5887
description Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors.
family unix
id oval:org.mitre.oval:def:6130
status accepted
submitted 2009-09-23T15:39:02.000-04:00
title VMware Descheduled Time Accounting Driver Bug Lets Local Users on the Guest Operating System Deny Service
version 3
refmap via4
bid 35141
bugtraq 20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues
confirm http://www.vmware.com/security/advisories/VMSA-2009-0007.html
sectrack 1022300
secunia 35269
vupen ADV-2009-1452
Last major update 30-10-2018 - 16:26
Published 01-06-2009 - 19:30
Last modified 30-10-2018 - 16:26
Back to Top