CVE-2015-1044
VMware Workstation Authorization Service Denial-of-Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.
vmware-authd (también conocido como el proceso de autorización) en VMware Workstation 10.x anterior a 10.0.5, VMware Player 6.x anterior a 6.0.5, y VMware ESXi 5.0 hasta 5.5 permite a atacantes causar una denegación de servicio del sistema operativo anfitrión a través de vectores no especificados.
This vulnerability allows remote attackers to cause a denial-of-service on vulnerable installations of VMWare Workstation. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the VMWare Authorization service, which is listening on port 912. By sending a malformed packet, an attacker is able to cause the service to shut itself down. The service will not automatically restart, and once disabled virtual machines will not be able to get access to new resources.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-12 CVE Reserved
- 2015-01-28 CVE Published
- 2024-08-06 CVE Updated
- 2024-09-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/62551 | Third Party Advisory | |
http://secunia.com/advisories/62569 | Third Party Advisory | |
http://secunia.com/advisories/62669 | Third Party Advisory | |
http://www.securityfocus.com/bid/72336 | Third Party Advisory | |
http://www.securitytracker.com/id/1031645 | Third Party Advisory | |
http://www.securitytracker.com/id/1031646 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100935 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.vmware.com/security/advisories/VMSA-2015-0001.html | 2017-09-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | 10.0 Search vendor "Vmware" for product "Workstation" and version "10.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | 10.0.1 Search vendor "Vmware" for product "Workstation" and version "10.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | 10.0.2 Search vendor "Vmware" for product "Workstation" and version "10.0.2" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | 10.0.3 Search vendor "Vmware" for product "Workstation" and version "10.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Workstation Search vendor "Vmware" for product "Workstation" | 10.0.4 Search vendor "Vmware" for product "Workstation" and version "10.0.4" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 5.0 Search vendor "Vmware" for product "Esxi" and version "5.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 5.0 Search vendor "Vmware" for product "Esxi" and version "5.0" | 1 |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 5.0 Search vendor "Vmware" for product "Esxi" and version "5.0" | 2 |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 5.1 Search vendor "Vmware" for product "Esxi" and version "5.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 5.1 Search vendor "Vmware" for product "Esxi" and version "5.1" | 1 |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 5.5 Search vendor "Vmware" for product "Esxi" and version "5.5" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | 6.0 Search vendor "Vmware" for product "Player" and version "6.0" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | 6.0.1 Search vendor "Vmware" for product "Player" and version "6.0.1" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | 6.0.2 Search vendor "Vmware" for product "Player" and version "6.0.2" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | 6.0.3 Search vendor "Vmware" for product "Player" and version "6.0.3" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Player Search vendor "Vmware" for product "Player" | 6.0.4 Search vendor "Vmware" for product "Player" and version "6.0.4" | - |
Affected
|