CVE-2009-1805

Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://secunia.com/advisories/35269 - Vendor Advisory () http://secunia.com/advisories/35269 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/503912/100/0/threaded - () http://www.securityfocus.com/archive/1/503912/100/0/threaded -
References () http://www.securityfocus.com/bid/35141 - () http://www.securityfocus.com/bid/35141 -
References () http://www.securitytracker.com/id?1022300 - () http://www.securitytracker.com/id?1022300 -
References () http://www.vmware.com/security/advisories/VMSA-2009-0007.html - Patch () http://www.vmware.com/security/advisories/VMSA-2009-0007.html - Patch
References () http://www.vupen.com/english/advisories/2009/1452 - () http://www.vupen.com/english/advisories/2009/1452 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130 -

Information

Published : 2009-06-01 19:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1805

Mitre link : CVE-2009-1805

CVE.ORG link : CVE-2009-1805


JSON object : View

Products Affected

vmware

  • ace
  • esxi
  • player
  • server
  • esx
  • fusion
  • workstation