CVE-2009-3733
VMware Server 2.0.1 / ESXi Server 3.5 - Directory Traversal
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
Vulnerabilidad de salto de directorio en VMware Server v1.x anteriores a v1.0.10 build 203137 y v2.x anteriores a v2.0.2 build 203138 en Linux, VMware ESXi v3.5 y VMware ESX v3.0.3 y v3.5 permite a atacantes remotos leer ficheros de su elección a través de vectores de ataque sin especificar.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2009-10-20 CVE Reserved
- 2009-10-27 CVE Published
- 2009-10-27 First Exploit
- 2024-08-07 CVE Updated
- 2024-11-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/37186 | Broken Link | |
http://securitytracker.com/id?1023088 | Third Party Advisory | |
http://securitytracker.com/id?1023089 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/507523/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/36842 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7822 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/33310 | 2009-10-27 |
URL | Date | SRC |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2009/000069.html | 2024-05-17 | |
http://www.vmware.com/security/advisories/VMSA-2009-0015.html | 2024-05-17 | |
http://www.vupen.com/english/advisories/2009/3062 | 2024-05-17 |
URL | Date | SRC |
---|---|---|
http://security.gentoo.org/glsa/glsa-201209-25.xml | 2024-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 2.0.0 Search vendor "Vmware" for product "Server" and version "2.0.0" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 2.0.1 Search vendor "Vmware" for product "Server" and version "2.0.1" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.0.3 Search vendor "Vmware" for product "Esx" and version "3.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.5 Search vendor "Vmware" for product "Esx" and version "3.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 3.5 Search vendor "Vmware" for product "Esxi" and version "3.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0 Search vendor "Vmware" for product "Server" and version "1.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.1 Search vendor "Vmware" for product "Server" and version "1.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.1_build_29996 Search vendor "Vmware" for product "Server" and version "1.0.1_build_29996" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.2 Search vendor "Vmware" for product "Server" and version "1.0.2" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.3 Search vendor "Vmware" for product "Server" and version "1.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.4 Search vendor "Vmware" for product "Server" and version "1.0.4" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.4_build_56528 Search vendor "Vmware" for product "Server" and version "1.0.4_build_56528" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.5 Search vendor "Vmware" for product "Server" and version "1.0.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.6 Search vendor "Vmware" for product "Server" and version "1.0.6" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.7 Search vendor "Vmware" for product "Server" and version "1.0.7" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.8 Search vendor "Vmware" for product "Server" and version "1.0.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.9 Search vendor "Vmware" for product "Server" and version "1.0.9" | - |
Affected
|