CVE-2008-1363

VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."
References
Link Resource
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Vendor Advisory
http://security.gentoo.org/glsa/glsa-201209-25.xml Third Party Advisory
http://securityreason.com/securityalert/3755 Third Party Advisory
http://securitytracker.com/id?1019622 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/489739/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28276 Patch Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0005.html Patch Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Patch Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html Patch Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html Patch Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html Patch Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Patch Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/0905/references Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 Third Party Advisory VDB Entry
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Vendor Advisory
http://security.gentoo.org/glsa/glsa-201209-25.xml Third Party Advisory
http://securityreason.com/securityalert/3755 Third Party Advisory
http://securitytracker.com/id?1019622 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/489739/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28276 Patch Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0005.html Patch Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Patch Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html Patch Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html Patch Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html Patch Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Patch Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/0905/references Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
OR cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://lists.vmware.com/pipermail/security-announce/2008/000008.html - Vendor Advisory () http://lists.vmware.com/pipermail/security-announce/2008/000008.html - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201209-25.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201209-25.xml - Third Party Advisory
References () http://securityreason.com/securityalert/3755 - Third Party Advisory () http://securityreason.com/securityalert/3755 - Third Party Advisory
References () http://securitytracker.com/id?1019622 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1019622 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/489739/100/0/threaded - VDB Entry, Third Party Advisory () http://www.securityfocus.com/archive/1/489739/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/28276 - Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/28276 - Patch, Third Party Advisory, VDB Entry
References () http://www.vmware.com/security/advisories/VMSA-2008-0005.html - Patch, Vendor Advisory () http://www.vmware.com/security/advisories/VMSA-2008-0005.html - Patch, Vendor Advisory
References () http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html - Patch, Vendor Advisory () http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html - Patch, Vendor Advisory
References () http://www.vmware.com/support/player/doc/releasenotes_player.html - Patch, Vendor Advisory () http://www.vmware.com/support/player/doc/releasenotes_player.html - Patch, Vendor Advisory
References () http://www.vmware.com/support/player2/doc/releasenotes_player2.html - Patch, Vendor Advisory () http://www.vmware.com/support/player2/doc/releasenotes_player2.html - Patch, Vendor Advisory
References () http://www.vmware.com/support/server/doc/releasenotes_server.html - Patch, Vendor Advisory () http://www.vmware.com/support/server/doc/releasenotes_server.html - Patch, Vendor Advisory
References () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html - Patch, Vendor Advisory () http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html - Patch, Vendor Advisory
References () http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html - Patch, Vendor Advisory () http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0905/references - Third Party Advisory () http://www.vupen.com/english/advisories/2008/0905/references - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 - Third Party Advisory, VDB Entry

Information

Published : 2008-03-20 00:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1363

Mitre link : CVE-2008-1363

CVE.ORG link : CVE-2008-1363


JSON object : View

Products Affected

vmware

  • ace
  • player
  • server
  • workstation

microsoft

  • windows
CWE
CWE-264

Permissions, Privileges, and Access Controls