CVE-2007-5360
 
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Buffer overflow in OpenPegasus Management server, when compiled to use PAM and with PEGASUS_USE_PAM_STANDALONE_PROC defined, as used in VMWare ESX Server 3.0.1 and 3.0.2, might allow remote attackers to execute arbitrary code via vectors related to PAM authentication, a different vulnerability than CVE-2008-0003.
El desbordamiento de búfer en OpenPegasus Management Server, cuando es compilado para usar PAM y con PEGASUS_USE_PAM_STANDALONE_PROC definido, tal como se usa en VMWare ESX Server versión 3.0.1 y versión 3.0.2, podría permitir que los atacantes remotos ejecuten código arbitrario por medio de vectores relacionados con la autenticación PAM, una vulnerabilidad diferente de CVE-2008-0003.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-10-10 CVE Reserved
- 2008-01-08 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2008/000002.html | Mailing List | |
http://secunia.com/advisories/28636 | Third Party Advisory | |
http://secunia.com/advisories/29986 | Third Party Advisory | |
http://securityreason.com/securityalert/3538 | Third Party Advisory | |
http://www.attrition.org/pipermail/vim/2008-January/001879.html | Mailing List | |
http://www.securityfocus.com/archive/1/485936/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/486859/100/0/threaded | Mailing List | |
http://www.vmware.com/security/advisories/VMSA-2008-0001.html | X_refsource_confirm | |
http://www.vupen.com/english/advisories/2008/0063 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0064 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/1391/references | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-5360 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39524 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/28358 | 2018-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openpegasus Search vendor "Openpegasus" | Management Server Search vendor "Openpegasus" for product "Management Server" | * | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.0.1 Search vendor "Vmware" for product "Esx" and version "3.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.0.2 Search vendor "Vmware" for product "Esx" and version "3.0.2" | - |
Affected
|