CVE-2008-0923

Directory traversal vulnerability in the Shared Folders feature for VMWare ACE 1.0.2 and 2.0.2, Player 1.0.4 and 2.0.2, and Workstation 5.5.4 and 6.0.2 allows guest OS users to read and write arbitrary files on the host OS via a multibyte string that produces a wide character string containing .. (dot dot) sequences, which bypasses the protection mechanism, as demonstrated using a "%c0%2e%c0%2e" string.
References
Link Resource
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034
http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
http://secunia.com/advisories/29117
http://securityreason.com/securityalert/3700
http://www.coresecurity.com/?action=item&id=2129
http://www.securityfocus.com/archive/1/488725/100/0/threaded
http://www.securityfocus.com/archive/1/489739/100/0/threaded
http://www.securityfocus.com/bid/27944
http://www.securityfocus.com/bid/28276
http://www.securitytracker.com/id?1019493
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/0679
http://www.vupen.com/english/advisories/2008/0905/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/40837
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034
http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
http://secunia.com/advisories/29117
http://securityreason.com/securityalert/3700
http://www.coresecurity.com/?action=item&id=2129
http://www.securityfocus.com/archive/1/488725/100/0/threaded
http://www.securityfocus.com/archive/1/489739/100/0/threaded
http://www.securityfocus.com/bid/27944
http://www.securityfocus.com/bid/28276
http://www.securitytracker.com/id?1019493
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/0679
http://www.vupen.com/english/advisories/2008/0905/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/40837
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.1_build_19317:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034 - () http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034 -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html -
References () http://lists.vmware.com/pipermail/security-announce/2008/000008.html - () http://lists.vmware.com/pipermail/security-announce/2008/000008.html -
References () http://secunia.com/advisories/29117 - () http://secunia.com/advisories/29117 -
References () http://securityreason.com/securityalert/3700 - () http://securityreason.com/securityalert/3700 -
References () http://www.coresecurity.com/?action=item&id=2129 - () http://www.coresecurity.com/?action=item&id=2129 -
References () http://www.securityfocus.com/archive/1/488725/100/0/threaded - () http://www.securityfocus.com/archive/1/488725/100/0/threaded -
References () http://www.securityfocus.com/archive/1/489739/100/0/threaded - () http://www.securityfocus.com/archive/1/489739/100/0/threaded -
References () http://www.securityfocus.com/bid/27944 - () http://www.securityfocus.com/bid/27944 -
References () http://www.securityfocus.com/bid/28276 - () http://www.securityfocus.com/bid/28276 -
References () http://www.securitytracker.com/id?1019493 - () http://www.securitytracker.com/id?1019493 -
References () http://www.vmware.com/security/advisories/VMSA-2008-0005.html - () http://www.vmware.com/security/advisories/VMSA-2008-0005.html -
References () http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html - () http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html -
References () http://www.vmware.com/support/player/doc/releasenotes_player.html - () http://www.vmware.com/support/player/doc/releasenotes_player.html -
References () http://www.vmware.com/support/player2/doc/releasenotes_player2.html - () http://www.vmware.com/support/player2/doc/releasenotes_player2.html -
References () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html - () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html -
References () http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html - () http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html -
References () http://www.vupen.com/english/advisories/2008/0679 - () http://www.vupen.com/english/advisories/2008/0679 -
References () http://www.vupen.com/english/advisories/2008/0905/references - () http://www.vupen.com/english/advisories/2008/0905/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/40837 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/40837 -

Information

Published : 2008-02-26 00:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-0923

Mitre link : CVE-2008-0923

CVE.ORG link : CVE-2008-0923


JSON object : View

Products Affected

vmware

  • ace
  • player
  • vmware_player
  • vmware_workstation
  • workstation
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')