Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-5438

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-13 Oct, 2007 | 01:00
Updated At-07 Aug, 2024 | 15:31
Rejected At-
Credits

Unspecified vulnerability in a certain ActiveX control in Reconfig.DLL in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 might allow local users to cause a denial of service to the Virtual Disk Mount Service (vmount2.exe), related to the ConnectPopulatedDiskEx function.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:13 Oct, 2007 | 01:00
Updated At:07 Aug, 2024 | 15:31
Rejected At:
▼CVE Numbering Authority (CNA)

Unspecified vulnerability in a certain ActiveX control in Reconfig.DLL in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 might allow local users to cause a denial of service to the Virtual Disk Mount Service (vmount2.exe), related to the ConnectPopulatedDiskEx function.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://osvdb.org/43488
vdb-entry
x_refsource_OSVDB
http://securityreason.com/securityalert/3219
third-party-advisory
x_refsource_SREASON
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
http://secunia.com/advisories/31709
third-party-advisory
x_refsource_SECUNIA
http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
x_refsource_MISC
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
x_refsource_CONFIRM
http://www.securitytracker.com/id?1020791
vdb-entry
x_refsource_SECTRACK
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
http://secunia.com/advisories/31710
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/482021/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
x_refsource_CONFIRM
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
http://www.securityfocus.com/bid/26025
vdb-entry
x_refsource_BID
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
http://secunia.com/advisories/31707
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/31708
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
Hyperlink: http://osvdb.org/43488
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://securityreason.com/securityalert/3219
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31709
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
Resource:
x_refsource_MISC
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id?1020791
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31710
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/482021/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/26025
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31707
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/31708
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://osvdb.org/43488
vdb-entry
x_refsource_OSVDB
x_transferred
http://securityreason.com/securityalert/3219
third-party-advisory
x_refsource_SREASON
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31709
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
x_refsource_MISC
x_transferred
http://www.vmware.com/support/server/doc/releasenotes_server.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id?1020791
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31710
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/482021/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/player/doc/releasenotes_player.html
x_refsource_CONFIRM
x_transferred
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/26025
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/archive/1/495869/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31707
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/31708
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2466
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://osvdb.org/43488
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://securityreason.com/securityalert/3219
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31709
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020791
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31710
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/482021/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/26025
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31707
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/31708
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:13 Oct, 2007 | 01:17
Updated At:15 Oct, 2018 | 21:44

Unspecified vulnerability in a certain ActiveX control in Reconfig.DLL in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 might allow local users to cause a denial of service to the Virtual Disk Mount Service (vmount2.exe), related to the ConnectPopulatedDiskEx function.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

VMware (Broadcom Inc.)
vmware
>>ace>>1.0
cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.1
cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.2
cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.3
cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.4
cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.5
cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.6
cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>1.0.7
cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>2.0
cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>2.0.1
cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>2.0.2
cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>2.0.3
cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>2.0.4
cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>ace>>2.0.5
cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.0
cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.1
cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.2
cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.3
cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.4
cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.5
cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.6
cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.7
cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>1.0.8
cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>2.0
cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>2.0.1
cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>2.0.2
cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>2.0.3
cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>2.0.4
cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_player>>2.0.5
cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>Versions up to 1.0.7(inclusive)
cpe:2.3:a:vmware:vmware_server:*:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0
cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0.1
cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0.2
cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0.3
cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0.4
cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0.5
cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_server>>1.0.6
cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.0
cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.1
cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.2
cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.3
cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.4
cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.5
cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.6
cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.7
cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>5.5.8
cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>6.0
cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>6.0.1
cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>6.0.2
cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
VMware (Broadcom Inc.)
vmware
>>vmware_workstation>>6.0.3
cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.htmlcve@mitre.org
N/A
http://osvdb.org/43488cve@mitre.org
N/A
http://secunia.com/advisories/31707cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31708cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31709cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31710cve@mitre.org
Vendor Advisory
http://securityreason.com/securityalert/3219cve@mitre.org
N/A
http://www.eleytt.com/advisories/eleytt_VMWARE1.pdfcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/482021/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/495869/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/26025cve@mitre.org
N/A
http://www.securitytracker.com/id?1020791cve@mitre.org
N/A
http://www.vmware.com/security/advisories/VMSA-2008-0014.htmlcve@mitre.org
N/A
http://www.vmware.com/support/ace/doc/releasenotes_ace.htmlcve@mitre.org
N/A
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.htmlcve@mitre.org
N/A
http://www.vmware.com/support/player/doc/releasenotes_player.htmlcve@mitre.org
N/A
http://www.vmware.com/support/player2/doc/releasenotes_player2.htmlcve@mitre.org
N/A
http://www.vmware.com/support/server/doc/releasenotes_server.htmlcve@mitre.org
N/A
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlcve@mitre.org
N/A
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlcve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2466cve@mitre.org
Vendor Advisory
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/43488
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31707
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31708
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31709
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/31710
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/3219
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/482021/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/495869/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/26025
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1020791
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/player/doc/releasenotes_player.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/server/doc/releasenotes_server.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2466
Source: cve@mitre.org
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

55Records found

CVE-2014-0179
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.11% / 29.36%
||
7 Day CHG~0.00%
Published-03 Aug, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.

Action-Not Available
Vendor-n/aRed Hat, Inc.openSUSE
Product-enterprise_linuxopensuselibvirtenterprise_virtualizationn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-3230
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-1.9||LOW
EPSS-0.12% / 32.29%
||
7 Day CHG~0.00%
Published-18 Jul, 2008 | 16:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ffmpeg lavf demuxer allows user-assisted attackers to cause a denial of service (application crash) via a crafted GIF file, possibly related to gstreamer, as demonstrated by lol-giftopnm.gif.

Action-Not Available
Vendor-n/aFFmpeg
Product-lavf_demuxern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-4570
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-1.9||LOW
EPSS-0.07% / 22.33%
||
7 Day CHG~0.00%
Published-10 Nov, 2007 | 00:00
Updated-07 Aug, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Algorithmic complexity vulnerability in the MCS translation daemon in mcstrans 0.2.3 allows local users to cause a denial of service (temporary daemon outage) via a large range of compartments in sensitivity labels.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-mcstransenterprise_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-6440
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.12% / 31.93%
||
7 Day CHG~0.00%
Published-15 Mar, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The parse_data_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.

Action-Not Available
Vendor-libplist_projectn/a
Product-libplistn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-3242
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-5.9||MEDIUM
EPSS-0.14% / 35.54%
||
7 Day CHG~0.00%
Published-27 Jan, 2017 | 22:01
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle VM Server for Sparc component of Oracle Sun Systems Products Suite (subcomponent: LDOM Manager). Supported versions that are affected are 3.2 and 3.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM Server for Sparc executes to compromise Oracle VM Server for Sparc. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM Server for Sparc, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM Server for Sparc. CVSS v3.0 Base Score 5.9 (Availability impacts).

Action-Not Available
Vendor-Oracle Corporation
Product-vm_serverLDOMS
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • Next
Details not found