CVE-2007-0061
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory."
El servidor DHCP en EMC VMware Workstation anterior a 5.5.5 construcción 56455 y 6.x anterior a 6.0.1 construcción 55017, Player anterior a 1.0.5 construcción 56455 y Player 2 anterior a2.0.1 construcción 55017, ACE anterior a1.0.3 construcción 54075 y ACE 2 anterior a2.0.1 construcción 55017, y Server anterior a 1.0.4 construcción 56528 permite a atacantes remotos ejecutar código de su eleccióna través de un paquete malformado que dispara "corrupción de memoria basado en pila".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-01-04 CVE Reserved
- 2007-09-20 CVE Published
- 2024-08-07 CVE Updated
- 2024-09-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html | Mailing List | |
http://secunia.com/advisories/26890 | Third Party Advisory | |
http://secunia.com/advisories/27694 | Third Party Advisory | |
http://secunia.com/advisories/27706 | Third Party Advisory | |
http://www.securitytracker.com/id?1018717 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2007/3229 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33101 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://security.gentoo.org/glsa/glsa-200711-23.xml | 2019-07-16 | |
http://www.ubuntu.com/usn/usn-543-1 | 2019-07-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Ace Search vendor "Vmware" for product "Ace" | >= 1.0 < 1.0.3 Search vendor "Vmware" for product "Ace" and version " >= 1.0 < 1.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Ace Search vendor "Vmware" for product "Ace" | >= 2.0 < 2.0.1 Search vendor "Vmware" for product "Ace" and version " >= 2.0 < 2.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 1.0 < 1.0.5 Search vendor "Vmware" for product "Player" and version " >= 1.0 < 1.0.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 2.0 < 2.0.1 Search vendor "Vmware" for product "Player" and version " >= 2.0 < 2.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | >= 1.0 < 1.0.4 Search vendor "Vmware" for product "Server" and version " >= 1.0 < 1.0.4" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 5.5 < 5.5.5 Search vendor "Vmware" for product "Workstation" and version " >= 5.5 < 5.5.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 6.0 < 6.0.1 Search vendor "Vmware" for product "Workstation" and version " >= 6.0 < 6.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 2.0.2 Search vendor "Vmware" for product "Esx" and version "2.0.2" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 2.1.3 Search vendor "Vmware" for product "Esx" and version "2.1.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 2.5.3 Search vendor "Vmware" for product "Esx" and version "2.5.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 2.5.4 Search vendor "Vmware" for product "Esx" and version "2.5.4" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.0.0 Search vendor "Vmware" for product "Esx" and version "3.0.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.0.1 Search vendor "Vmware" for product "Esx" and version "3.0.1" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.06 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 7.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "7.04" | - |
Affected
|