CVE-2011-1789
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The self-extracting installer in the vSphere Client Installer package in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, VMware ESXi 4.x before 4.1 Update 1, and VMware ESX 4.x before 4.1 Update 1 does not have a digital signature, which might make it easier for remote attackers to spoof the software distribution via a Trojan horse installer.
El instalador auto-extraible del cliente vSphere en VMware vCenter 4.0 anteriores a la Actualización 3 y v4.1 anteriores a la Actualización 1, VMware ESXi v4.x anteriores a v4.1 Actualización 1, y VMware ESX v4.x anteriores a v4.1 Actualización 1 no tiene una firma digital , lo que podría facilitar a los atacantes remotos a falsificar la distribución de software a través de un instalador troyanizado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-04-19 CVE Reserved
- 2011-05-05 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-310: Cryptographic Issues
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1025502 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2011/000137.html | 2011-05-26 | |
http://www.vmware.com/security/advisories/VMSA-2011-0008.html | 2011-05-26 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 4.0 Search vendor "Vmware" for product "Esx" and version "4.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esx Search vendor "Vmware" for product "Esx" | 4.1 Search vendor "Vmware" for product "Esx" and version "4.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 4.0 Search vendor "Vmware" for product "Esxi" and version "4.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 4.1 Search vendor "Vmware" for product "Esxi" and version "4.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Vcenter Search vendor "Vmware" for product "Vcenter" | 4.0 Search vendor "Vmware" for product "Vcenter" and version "4.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Vcenter Search vendor "Vmware" for product "Vcenter" | 4.0 Search vendor "Vmware" for product "Vcenter" and version "4.0" | update_1 |
Affected
| ||||||
Vmware Search vendor "Vmware" | Vcenter Search vendor "Vmware" for product "Vcenter" | 4.0 Search vendor "Vmware" for product "Vcenter" and version "4.0" | update_2 |
Affected
| ||||||
Vmware Search vendor "Vmware" | Vcenter Search vendor "Vmware" for product "Vcenter" | 4.1 Search vendor "Vmware" for product "Vcenter" and version "4.1" | - |
Affected
|