CVE-2009-3707

VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\xFF sequence in the USER and PASS commands, related to a "format string DoS" issue. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
http://lists.vmware.com/pipermail/security-announce/2010/000090.html
http://secunia.com/advisories/36988 Vendor Advisory
http://secunia.com/advisories/39206
http://secunia.com/advisories/39215
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://securitytracker.com/id?1022997
http://www.securityfocus.com/bid/36630
http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt URL Repurposed
http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php URL Repurposed
http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html Exploit URL Repurposed
http://www.vmware.com/security/advisories/VMSA-2010-0007.html
http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html
http://lists.vmware.com/pipermail/security-announce/2010/000090.html
http://secunia.com/advisories/36988 Vendor Advisory
http://secunia.com/advisories/39206
http://secunia.com/advisories/39215
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://securitytracker.com/id?1022997
http://www.securityfocus.com/bid/36630
http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt URL Repurposed
http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php URL Repurposed
http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html Exploit URL Repurposed
http://www.vmware.com/security/advisories/VMSA-2010-0007.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:08

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html - () http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html -
References () http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html - () http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html -
References () http://lists.vmware.com/pipermail/security-announce/2010/000090.html - () http://lists.vmware.com/pipermail/security-announce/2010/000090.html -
References () http://secunia.com/advisories/36988 - Vendor Advisory () http://secunia.com/advisories/36988 - Vendor Advisory
References () http://secunia.com/advisories/39206 - () http://secunia.com/advisories/39206 -
References () http://secunia.com/advisories/39215 - () http://secunia.com/advisories/39215 -
References () http://security.gentoo.org/glsa/glsa-201209-25.xml - () http://security.gentoo.org/glsa/glsa-201209-25.xml -
References () http://securitytracker.com/id?1022997 - () http://securitytracker.com/id?1022997 -
References () http://www.securityfocus.com/bid/36630 - () http://www.securityfocus.com/bid/36630 -
References () http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt - URL Repurposed () http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt - URL Repurposed
References () http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php - URL Repurposed () http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php - URL Repurposed
References () http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html - Exploit, URL Repurposed () http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html - Exploit, URL Repurposed
References () http://www.vmware.com/security/advisories/VMSA-2010-0007.html - () http://www.vmware.com/security/advisories/VMSA-2010-0007.html -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html - Exploit (MISC) http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html - Exploit, URL Repurposed
References (MISC) http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php - (MISC) http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php - URL Repurposed
References (MISC) http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt - (MISC) http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt - URL Repurposed

Information

Published : 2009-10-16 16:30

Updated : 2024-11-21 01:08


NVD link : CVE-2009-3707

Mitre link : CVE-2009-3707

CVE.ORG link : CVE-2009-3707


JSON object : View

Products Affected

vmware

  • player
  • ace
  • server
  • workstation
CWE
CWE-134

Use of Externally-Controlled Format String