CVE-2007-5438

Unspecified vulnerability in a certain ActiveX control in Reconfig.DLL in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 might allow local users to cause a denial of service to the Virtual Disk Mount Service (vmount2.exe), related to the ConnectPopulatedDiskEx function.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
http://osvdb.org/43488
http://secunia.com/advisories/31707 Vendor Advisory
http://secunia.com/advisories/31708 Vendor Advisory
http://secunia.com/advisories/31709 Vendor Advisory
http://secunia.com/advisories/31710 Vendor Advisory
http://securityreason.com/securityalert/3219
http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
http://www.securityfocus.com/archive/1/482021/100/0/threaded
http://www.securityfocus.com/archive/1/495869/100/0/threaded
http://www.securityfocus.com/bid/26025
http://www.securitytracker.com/id?1020791
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/server/doc/releasenotes_server.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/2466 Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
http://osvdb.org/43488
http://secunia.com/advisories/31707 Vendor Advisory
http://secunia.com/advisories/31708 Vendor Advisory
http://secunia.com/advisories/31709 Vendor Advisory
http://secunia.com/advisories/31710 Vendor Advisory
http://securityreason.com/securityalert/3219
http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf
http://www.securityfocus.com/archive/1/482021/100/0/threaded
http://www.securityfocus.com/archive/1/495869/100/0/threaded
http://www.securityfocus.com/bid/26025
http://www.securitytracker.com/id?1020791
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/server/doc/releasenotes_server.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/2466 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:37

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html -
References () http://osvdb.org/43488 - () http://osvdb.org/43488 -
References () http://secunia.com/advisories/31707 - Vendor Advisory () http://secunia.com/advisories/31707 - Vendor Advisory
References () http://secunia.com/advisories/31708 - Vendor Advisory () http://secunia.com/advisories/31708 - Vendor Advisory
References () http://secunia.com/advisories/31709 - Vendor Advisory () http://secunia.com/advisories/31709 - Vendor Advisory
References () http://secunia.com/advisories/31710 - Vendor Advisory () http://secunia.com/advisories/31710 - Vendor Advisory
References () http://securityreason.com/securityalert/3219 - () http://securityreason.com/securityalert/3219 -
References () http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf - () http://www.eleytt.com/advisories/eleytt_VMWARE1.pdf -
References () http://www.securityfocus.com/archive/1/482021/100/0/threaded - () http://www.securityfocus.com/archive/1/482021/100/0/threaded -
References () http://www.securityfocus.com/archive/1/495869/100/0/threaded - () http://www.securityfocus.com/archive/1/495869/100/0/threaded -
References () http://www.securityfocus.com/bid/26025 - () http://www.securityfocus.com/bid/26025 -
References () http://www.securitytracker.com/id?1020791 - () http://www.securitytracker.com/id?1020791 -
References () http://www.vmware.com/security/advisories/VMSA-2008-0014.html - () http://www.vmware.com/security/advisories/VMSA-2008-0014.html -
References () http://www.vmware.com/support/ace/doc/releasenotes_ace.html - () http://www.vmware.com/support/ace/doc/releasenotes_ace.html -
References () http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html - () http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html -
References () http://www.vmware.com/support/player/doc/releasenotes_player.html - () http://www.vmware.com/support/player/doc/releasenotes_player.html -
References () http://www.vmware.com/support/player2/doc/releasenotes_player2.html - () http://www.vmware.com/support/player2/doc/releasenotes_player2.html -
References () http://www.vmware.com/support/server/doc/releasenotes_server.html - () http://www.vmware.com/support/server/doc/releasenotes_server.html -
References () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html - () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -
References () http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html - () http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -
References () http://www.vupen.com/english/advisories/2008/2466 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/2466 - Vendor Advisory

Information

Published : 2007-10-13 01:17

Updated : 2024-11-21 00:37


NVD link : CVE-2007-5438

Mitre link : CVE-2007-5438

CVE.ORG link : CVE-2007-5438


JSON object : View

Products Affected

vmware

  • ace
  • vmware_workstation
  • vmware_player
  • vmware_server
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo