CVE-2007-4059
VMware 'IntraProcessLogging.dll' 5.5.3.42958 - Arbitrary Data Write
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Absolute path traversal vulnerability in a certain ActiveX control in IntraProcessLogging.dll 5.5.3.42958 in EMC VMware allows remote attackers to create or overwrite arbitrary files via a full pathname in the argument to the SetLogFileName method.
Vulnerabilidad de salto de directorio absoluto en cierto control ActiveX en IntraProcessLogging.dll 5.5.3.42958 en EMC VMware permite a atacantes remotos crear o sobrescribir archivos de su elección a través de un nombre de ruta completa en el argumento en el método SetLogFileName.
Updates have been released for arbitrary code execution, denial of service, and other various vulnerabilities in VMware.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-07-30 CVE Reserved
- 2007-07-30 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html | Mailing List | |
http://secunia.com/advisories/26890 | Third Party Advisory | |
http://www.securityfocus.com/bid/25110 | Vdb Entry | |
http://www.vmware.com/support/ace/doc/releasenotes_ace.html | X_refsource_confirm | |
http://www.vmware.com/support/player/doc/releasenotes_player.html | X_refsource_confirm | |
http://www.vmware.com/support/player2/doc/releasenotes_player2.html | X_refsource_confirm | |
http://www.vmware.com/support/server/doc/releasenotes_server.html | X_refsource_confirm | |
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html | X_refsource_confirm | |
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html | X_refsource_confirm | |
http://www.vupen.com/english/advisories/2007/3229 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35675 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/4240 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | 5.5.3 Search vendor "Vmware" for product "Workstation" and version "5.5.3" | 42958 |
Affected
|