CVE-2008-4917
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption.
Vulnerabilidad sin especificar en VMware Workstation v5.5.8 y anteriores, y v6.0.5 y anteriores, versiones v6.x; VMware Player v1.0.8 y anteriores, y v2.0.5 y versiones anteriores a v2.x; VMware Server v1.0.9 y anteriores; VMware ESXi v3.5; y VMware ESX v3.0.2 a la v3.5, permite a los usuarios del sistema operativo huésped tener un impacto desconocido mediante el envío de una petición de hardware que lanza una operación de escritura física de la memoria, permitiendo una corrupción de memoria.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-11-03 CVE Reserved
- 2008-12-04 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/32965 | Third Party Advisory | |
http://securitytracker.com/id?1021300 | Third Party Advisory | |
http://securitytracker.com/id?1021301 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/498863/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/498886/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/32597 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://kb.vmware.com/kb/1006980 | 2018-11-02 |
URL | Date | SRC |
---|---|---|
http://kb.vmware.com/kb/1006986 | 2018-11-02 | |
http://security.gentoo.org/glsa/glsa-201209-25.xml | 2018-11-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | >= 3.0.2 <= 3.5 Search vendor "Vmware" for product "Esx" and version " >= 3.0.2 <= 3.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 3.5 Search vendor "Vmware" for product "Esxi" and version "3.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 1.0.0 <= 1.0.8 Search vendor "Vmware" for product "Player" and version " >= 1.0.0 <= 1.0.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | >= 2.0 <= 2.0.5 Search vendor "Vmware" for product "Player" and version " >= 2.0 <= 2.0.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | >= 1.0 <= 1.0.9 Search vendor "Vmware" for product "Server" and version " >= 1.0 <= 1.0.9" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 5.5 <= 5.5.8 Search vendor "Vmware" for product "Workstation" and version " >= 5.5 <= 5.5.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | >= 6.0 <= 6.0.5 Search vendor "Vmware" for product "Workstation" and version " >= 6.0 <= 6.0.5" | - |
Affected
|