// For flags

CVE-2008-1363

 

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."

VMware Workstation versiones 6.0.x anteriores a 6.0.3 y versiones 5.5.x anteriores a 5.5.6, VMware Player versiones 2.0.x anteriores a 2.0.3 y versiones 1.0.x anteriores a 1.0.6, VMware ACE versiones 2.0.x anteriores a 2.0.1 y versiones 1.0.x anteriores a 1.0.5, y VMware Server versiones 1.0.x anteriores a 1.0.5 para Windows permite a usuarios locales obtener privilegios mediante una modificación no especificada del fichero config.ini localizado en la carpeta de Datos de Aplicación, que puede ser usado para "secuestrar el proceso VMX".

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-03-17 CVE Reserved
  • 2008-03-19 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
>= 1.0 < 1.0.5
Search vendor "Vmware" for product "Ace" and version " >= 1.0 < 1.0.5"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
>= 2.0 < 2.0.1
Search vendor "Vmware" for product "Ace" and version " >= 2.0 < 2.0.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
>= 1.0.0 < 1.0.6
Search vendor "Vmware" for product "Player" and version " >= 1.0.0 < 1.0.6"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
>= 2.0 < 2.0.3
Search vendor "Vmware" for product "Player" and version " >= 2.0 < 2.0.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Server
Search vendor "Vmware" for product "Server"
>= 1.0 < 1.0.5
Search vendor "Vmware" for product "Server" and version " >= 1.0 < 1.0.5"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
>= 5.5 < 5.5.6
Search vendor "Vmware" for product "Workstation" and version " >= 5.5 < 5.5.6"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
>= 6.0 < 6.0.3
Search vendor "Vmware" for product "Workstation" and version " >= 6.0 < 6.0.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe