CVE-2008-4279
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The CPU hardware emulation for 64-bit guest operating systems in VMware Workstation 6.0.x before 6.0.5 build 109488 and 5.x before 5.5.8 build 108000; Player 2.0.x before 2.0.5 build 109488 and 1.x before 1.0.8; Server 1.x before 1.0.7 build 108231; and ESX 2.5.4 through 3.5 allows authenticated guest OS users to gain additional guest OS privileges by triggering an exception that causes the virtual CPU to perform an indirect jump to a non-canonical address.
La emulación de hardware de CPU para sistemas operativos invitados de 64 bits en VMware Workstation versión 6.0.x anterior a 6.0.5 build 109488 y versión 5.x anterior a 5.5.8 build 108000; Player versión 2.0.x anterior a 2.0.5 build 109488 y versión 1.x anterior a 1.0.8; Server versión 1.x anterior a 1.0.7 build 108231; y ESX versión 2.5.4 anterior a 3.5, permite a los usuarios del sistema operativo invitado autenticado conseguir privilegios adicionales del sistema operativo invitado mediante la activación de una excepción que hace que la CPU virtual realice un salto indirecto a una dirección no canónica.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-09-26 CVE Reserved
- 2008-10-06 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2008-October/064860.html | Mailing List | |
http://marc.info/?l=bugtraq&m=122331139823057&w=2 | Mailing List | |
http://secunia.com/advisories/32157 | Third Party Advisory | |
http://secunia.com/advisories/32179 | Third Party Advisory | |
http://secunia.com/advisories/32180 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/497041/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/31569 | Third Party Advisory | |
http://www.securitytracker.com/id?1020991 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2008/2740 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45668 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5929 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.vmware.com/security/advisories/VMSA-2008-0016.html | 2018-11-02 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 1.0 < 1.0.8 Search vendor "Vmware" for product "Player" and version " >= 1.0 < 1.0.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 2.0 < 2.0.5 Search vendor "Vmware" for product "Player" and version " >= 2.0 < 2.0.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | >= 1.0 < 1.0.8 Search vendor "Vmware" for product "Server" and version " >= 1.0 < 1.0.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 5.5 < 5.5.8 Search vendor "Vmware" for product "Workstation" and version " >= 5.5 < 5.5.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 6.0 < 6.0.5 Search vendor "Vmware" for product "Workstation" and version " >= 6.0 < 6.0.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | >= 2.5.4 <= 3.5 Search vendor "Vmware" for product "Esx" and version " >= 2.5.4 <= 3.5" | - |
Affected
|