CVE-2009-3733
VMware Server Directory Traversal Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
Vulnerabilidad de salto de directorio en VMware Server v1.x anteriores a v1.0.10 build 203137 y v2.x anteriores a v2.0.2 build 203138 en Linux, VMware ESXi v3.5 y VMware ESX v3.0.3 y v3.5 permite a atacantes remotos leer ficheros de su elección a través de vectores de ataque sin especificar.
Multiple vulnerabilities have been found in VMware Player, Server, and Workstation, allowing remote and local attackers to conduct several attacks, including privilege escalation, remote execution of arbitrary code, and a Denial of Service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-10-20 CVE Reserved
- 2009-10-27 CVE Published
- 2014-05-12 First Exploit
- 2024-08-07 CVE Updated
- 2025-07-21 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/37186 | Broken Link | |
http://securitytracker.com/id?1023088 | Third Party Advisory | |
http://securitytracker.com/id?1023089 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/507523/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/36842 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7822 | Signature | |
https://www.vmware.com/security/advisories/VMSA-2009-0015.html | ||
http://fyrmassociates.com/tools/gueststealer-v1.1.pl |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180930 | 2024-08-31 | |
https://www.exploit-db.com/exploits/33310 | 2014-05-12 |
URL | Date | SRC |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2009/000069.html | 2024-05-17 | |
http://www.vmware.com/security/advisories/VMSA-2009-0015.html | 2024-05-17 | |
http://www.vupen.com/english/advisories/2009/3062 | 2024-05-17 |
URL | Date | SRC |
---|---|---|
http://security.gentoo.org/glsa/glsa-201209-25.xml | 2024-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 2.0.0 Search vendor "Vmware" for product "Server" and version "2.0.0" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 2.0.1 Search vendor "Vmware" for product "Server" and version "2.0.1" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.0.3 Search vendor "Vmware" for product "Esx" and version "3.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 3.5 Search vendor "Vmware" for product "Esx" and version "3.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 3.5 Search vendor "Vmware" for product "Esxi" and version "3.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0 Search vendor "Vmware" for product "Server" and version "1.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.1 Search vendor "Vmware" for product "Server" and version "1.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.1_build_29996 Search vendor "Vmware" for product "Server" and version "1.0.1_build_29996" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.2 Search vendor "Vmware" for product "Server" and version "1.0.2" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.3 Search vendor "Vmware" for product "Server" and version "1.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.4 Search vendor "Vmware" for product "Server" and version "1.0.4" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.4_build_56528 Search vendor "Vmware" for product "Server" and version "1.0.4_build_56528" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.5 Search vendor "Vmware" for product "Server" and version "1.0.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.6 Search vendor "Vmware" for product "Server" and version "1.0.6" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.7 Search vendor "Vmware" for product "Server" and version "1.0.7" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.8 Search vendor "Vmware" for product "Server" and version "1.0.8" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Server Search vendor "Vmware" for product "Server" | 1.0.9 Search vendor "Vmware" for product "Server" and version "1.0.9" | - |
Affected
|