CVE-2009-1147 (GCVE-0-2009-1147)
Vulnerability from cvelistv5 – Published: 2009-04-06 15:00 – Updated: 2024-08-07 05:04
VLAI?
Summary
Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:04:48.314Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:5471",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5471"
},
{
"name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
},
{
"name": "34373",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34373"
},
{
"name": "ADV-2009-0944",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0944"
},
{
"name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
},
{
"name": "1021976",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021976"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-04-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:5471",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5471"
},
{
"name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
},
{
"name": "34373",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34373"
},
{
"name": "ADV-2009-0944",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0944"
},
{
"name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
},
{
"name": "1021976",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021976"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1147",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:5471",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5471"
},
{
"name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
},
{
"name": "34373",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34373"
},
{
"name": "ADV-2009-0944",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0944"
},
{
"name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues",
"refsource": "MLIST",
"url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
},
{
"name": "1021976",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021976"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1147",
"datePublished": "2009-04-06T15:00:00",
"dateReserved": "2009-03-25T00:00:00",
"dateUpdated": "2024-08-07T05:04:48.314Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-1147\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-04-06T15:30:04.437\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in vmci.sys in the Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 2.0.x before 2.0.1 build 156745 allows local users to gain privileges via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en el archivo vmci.sys en la Virtual Machine Communication Interface (VMCI) en VMware Workstation v6.5.1 y anteriores, VMware Player v2.5.1 y anteriores, VMware ACE 2.5.1 y anteriores, y VMware Server v2.0.x anteriores a v2.0.1 build 156745 permite a los usuarios locales obtener privilegios a trav\u00e9s de vectores desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A1A5C22-A89A-4B6B-9108-8C3678BBBC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700C0BB4-2272-4405-9D9A-A636E3D22461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC82A8C-E561-4E35-A84D-66A4D6C90264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D346E48-887C-4D02-BFD3-D323B7F3871C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9C6150A-2DF3-4F7B-B024-0F3DBB686124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B6602F-EF25-4E20-B4AA-955C026F7AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40192EE1-A300-42C3-BC98-286C9E5A281E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87291B27-442C-4CAB-94A1-67FC766486EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B04862-4377-422E-931A-B17FE1CA1884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B6730-F05B-4B62-B4DE-07C61A4924F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E1A5AA-BD9F-4263-B7C6-E744323C4D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D22E40D-C362-49FD-924C-262A64555934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D438AB9-825C-4A9B-A3FF-55F2E5743B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A48CEB4-5864-4A0F-B14C-CFE4699C3311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78957047-FB9F-4D1D-B3D9-91257A6B4D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A04DB52-C66C-4AA9-9D6F-9D2DC202C5C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280033C5-90EF-4825-A87D-B23650D8C71A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71537AE-346D-4BA9-90E7-EA0AB0CD0886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5674C3DD-F510-4701-ACA8-437576307528\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBF029A-103D-4BB6-B037-25EC2224DF34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D00C4D90-3697-4F3F-8FFF-FE63F3AD0DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A717A5-60C2-4470-943E-CA53781D4B14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8FBC02-7F2F-4AEF-A5A3-E283D192937C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29AA2B37-BF5F-4AC5-844D-34CF56EC621C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07131E56-53EE-4CE1-A135-050792EA3C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86334051-8763-4CD9-9480-CAEAE756DFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66596F04-9C2E-4091-85A7-40239F3F920E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E831531-60FE-4DFC-994E-7409E6C69D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C1A275E-2152-4A37-8CFE-34E8900E3426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7A688A2-3E9C-4AA3-832B-300A5A311C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89098CFF-4696-4BD9-9BC9-D7C2D92FE729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30DFFE7-EB73-4A88-A23B-9B386C091314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F1481E-A07D-4913-BCF3-630561F0FBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6C230D-7BAA-4A77-9E96-B1B994F4AAC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0FE7C5-2C46-4B59-9242-A03B986C07DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC8F9694-8556-4990-A867-592D6A927498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C605123-69F9-44AC-A17E-3C728059E628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37595A89-52C5-4699-A463-C9D91B91716B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41B54C61-FB19-4900-A635-2F6B63BEC88C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BCB22F-7B9A-493B-AE19-18D0C15EA778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"294B621F-6C1A-4571-AE13-49495680D255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D6D4DD-13D2-4EA0-A7D7-367C3809ABAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF51A7F-59DA-4F64-A4F7-3A250C950D0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA47458-E783-4A6A-ABF1-59E8D87E9B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*\",\"matchCriteriaId\":\"559D2177-ECB9-4AFF-A8B4-BCB47A1B4637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C6D608-64DE-4CC4-9869-3342E8FD707F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDEAB605-03F6-4968-8A48-126C7C711043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16A1141D-9718-4A22-8FF2-AEAD28E07291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE2ADE72-4F19-4E73-AC3E-7038FE0D38B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75ED54E-8E55-48BF-A52E-19FCCE895C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B27D214D-2BEF-4445-802A-5E02E9E5E5CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53297E3-0C74-421B-8058-DAF7357D421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACDEFCEF-F943-449B-91D8-A8CB290C7AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97957D6F-0249-4814-8755-5C4537B58E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89329F80-7134-4AB2-BDA3-E1B887F633B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4408849A-21F1-40F5-A528-0BD47E1BF823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0692E537-A36E-470B-BECE-A17D531B925C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9938CB4F-96D1-4852-9694-28A93E13AA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB61760-87FD-4E60-ADC6-407EFA13773C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBDE6D5-7131-421A-BABE-32F281615597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AA4FEF-FF8F-4706-89BC-8396F7614EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC6B629-30B3-4C45-B5E9-1B4310F186FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E658DA-56E8-49F0-B486-4EF622B63627\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E76D03A3-DB55-48A2-B5A5-64002D28B95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EAC68CA-DCA3-4399-807D-E7AC67C9C3E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47B13A58-1876-4322-AC25-107D43BABD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D04A928-4421-4BEE-9500-7398E4DB929B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088450C4-9C6F-4651-8D59-C36F1B0601BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA35C066-90A9-4DE2-A97A-38A6CFC59A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462EEAD5-A78C-4381-847E-B6F1BE4CB379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E666A5E4-4CDD-4915-B0F3-C63998D01846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7AD12A-26C9-48AD-A32A-0F56545DF8E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73C45BB0-C0DB-42B8-A238-B81D836CF91E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297226F7-05CB-4721-9D02-51FE2919D2DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3F9D4D-2116-49A7-9292-AF6B4456E175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2EAA90-B24A-45E7-B99F-DA3554A16F92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"446F2959-C42B-403B-AE1C-BA7D305C60CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE944A70-CB9C-4712-9802-509531396A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2786E370-6108-4695-B0A8-9F19D8E3C0C0\"}]}]}],\"references\":[{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2009/000054.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2009/Apr/0036.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/34373\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021976\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0944\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5471\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2009/000054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2009/Apr/0036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/34373\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…