CVE-2008-1363
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."
VMware Workstation versiones 6.0.x anteriores a 6.0.3 y versiones 5.5.x anteriores a 5.5.6, VMware Player versiones 2.0.x anteriores a 2.0.3 y versiones 1.0.x anteriores a 1.0.6, VMware ACE versiones 2.0.x anteriores a 2.0.1 y versiones 1.0.x anteriores a 1.0.5, y VMware Server versiones 1.0.x anteriores a 1.0.5 para Windows permite a usuarios locales obtener privilegios mediante una modificación no especificada del fichero config.ini localizado en la carpeta de Datos de Aplicación, que puede ser usado para "secuestrar el proceso VMX".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-03-17 CVE Reserved
- 2008-03-19 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/3755 | Third Party Advisory | |
http://securitytracker.com/id?1019622 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/489739/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/0905/references | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2008/000008.html | 2018-11-01 | |
http://security.gentoo.org/glsa/glsa-201209-25.xml | 2018-11-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Ace Search vendor "Vmware" for product "Ace" | >= 1.0 < 1.0.5 Search vendor "Vmware" for product "Ace" and version " >= 1.0 < 1.0.5" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Vmware Search vendor "Vmware" | Ace Search vendor "Vmware" for product "Ace" | >= 2.0 < 2.0.1 Search vendor "Vmware" for product "Ace" and version " >= 2.0 < 2.0.1" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 1.0.0 < 1.0.6 Search vendor "Vmware" for product "Player" and version " >= 1.0.0 < 1.0.6" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 2.0 < 2.0.3 Search vendor "Vmware" for product "Player" and version " >= 2.0 < 2.0.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | >= 1.0 < 1.0.5 Search vendor "Vmware" for product "Server" and version " >= 1.0 < 1.0.5" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 5.5 < 5.5.6 Search vendor "Vmware" for product "Workstation" and version " >= 5.5 < 5.5.6" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 6.0 < 6.0.3 Search vendor "Vmware" for product "Workstation" and version " >= 6.0 < 6.0.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|