CVE-2008-4916

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.

References

http://lists.vmware.com/pipermail/security-announce/2009/000054.html

http://seclists.org/fulldisclosure/2009/Apr/0036.html

http://security.gentoo.org/glsa/glsa-201209-25.xml

http://www.securityfocus.com/bid/34373

http://www.securitytracker.com/id?1021973

http://www.vmware.com/security/advisories/VMSA-2009-0005.html

http://www.vupen.com/english/advisories/2009/0944

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439

Details

Source: MITRE

Published: 2009-04-06

Updated: 2017-09-29

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
62383GLSA-201209-25 : VMware Player, Server, Workstation: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
40390VMSA-2009-0005 : VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issuesNessusVMware ESX Local Security Checks
high
36117VMware Products Multiple Vulnerabilities (VMSA-2009-0005/VMSA-2009-0007)NessusWindows
high