// For flags

CVE-2009-4811

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\x90 sequence in the USER and PASS commands, a related issue to CVE-2009-3707. NOTE: some of these details are obtained from third party information.

VMware Authentication Daemon 1.0 en vmware-authd.exe en VMware Authorization Service en VMware Workstation 7.0 en versiones anteriores a la 7.0.1 build 227600 y 6.5.x en versiones anteriores a la 6.5.4 build 246459, VMware Player 3.0 en versiones anteriores a la 3.0.1 build 227600 y 2.5.x en versiones anteriores a la 2.5.4 build 246459, VMware ACE 2.6 en versiones anteriores a la 2.6.1 build 227600 y 2.5.x en versiones anteriores a la 2.5.4 build 246459 y VMware Server 2.x permiten a atacantes remotos provocar una denegación de servicio (caída del proceso) mediante una secuencia \x25\x90 en los comandos USER y PASS, un problema relacionado con CVE-2009-3707. NOTA: algunos de estos detalles se han obtenido de información de terceros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-04-27 CVE Reserved
  • 2010-04-27 CVE Published
  • 2023-11-06 EPSS Updated
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-134: Use of Externally-Controlled Format String
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.5.0
Search vendor "Vmware" for product "Ace" and version "2.5.0"
-
Affected
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.5.1
Search vendor "Vmware" for product "Ace" and version "2.5.1"
-
Affected
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.5.2
Search vendor "Vmware" for product "Ace" and version "2.5.2"
-
Affected
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.5.3
Search vendor "Vmware" for product "Ace" and version "2.5.3"
-
Affected
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.5.4
Search vendor "Vmware" for product "Ace" and version "2.5.4"
-
Affected
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.6
Search vendor "Vmware" for product "Ace" and version "2.6"
-
Affected
Vmware
Search vendor "Vmware"
Ace
Search vendor "Vmware" for product "Ace"
2.6.1
Search vendor "Vmware" for product "Ace" and version "2.6.1"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
2.5
Search vendor "Vmware" for product "Player" and version "2.5"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
2.5.1
Search vendor "Vmware" for product "Player" and version "2.5.1"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
2.5.2
Search vendor "Vmware" for product "Player" and version "2.5.2"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
2.5.3
Search vendor "Vmware" for product "Player" and version "2.5.3"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
2.5.4
Search vendor "Vmware" for product "Player" and version "2.5.4"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
3.0
Search vendor "Vmware" for product "Player" and version "3.0"
-
Affected
Vmware
Search vendor "Vmware"
Player
Search vendor "Vmware" for product "Player"
3.0.1
Search vendor "Vmware" for product "Player" and version "3.0.1"
-
Affected
Vmware
Search vendor "Vmware"
Server
Search vendor "Vmware" for product "Server"
2.0.0
Search vendor "Vmware" for product "Server" and version "2.0.0"
-
Affected
Vmware
Search vendor "Vmware"
Server
Search vendor "Vmware" for product "Server"
2.0.1
Search vendor "Vmware" for product "Server" and version "2.0.1"
-
Affected
Vmware
Search vendor "Vmware"
Server
Search vendor "Vmware" for product "Server"
2.0.2
Search vendor "Vmware" for product "Server" and version "2.0.2"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
6.5.0
Search vendor "Vmware" for product "Workstation" and version "6.5.0"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
6.5.1
Search vendor "Vmware" for product "Workstation" and version "6.5.1"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
6.5.2
Search vendor "Vmware" for product "Workstation" and version "6.5.2"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
6.5.3
Search vendor "Vmware" for product "Workstation" and version "6.5.3"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
6.5.4
Search vendor "Vmware" for product "Workstation" and version "6.5.4"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.0
Search vendor "Vmware" for product "Workstation" and version "7.0"
-
Affected
Vmware
Search vendor "Vmware"
Workstation
Search vendor "Vmware" for product "Workstation"
7.0.1
Search vendor "Vmware" for product "Workstation" and version "7.0.1"
-
Affected