Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.
http://lists.vmware.com/pipermail/security-announce/2009/000054.html
http://seclists.org/fulldisclosure/2009/Apr/0036.html
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://www.securityfocus.com/bid/34373
http://www.securitytracker.com/id?1021973
http://www.vmware.com/security/advisories/VMSA-2009-0005.html
http://www.vupen.com/english/advisories/2009/0944
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439
Source: MITRE
Published: 2009-04-06
Updated: 2017-09-29
Type: NVD-CWE-noinfo
Base Score: 4.6
Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C
Impact Score: 6.9
Exploitability Score: 3.1
Severity: MEDIUM
OR
cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
62383 | GLSA-201209-25 : VMware Player, Server, Workstation: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | critical |
40390 | VMSA-2009-0005 : VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues | Nessus | VMware ESX Local Security Checks | high |
36117 | VMware Products Multiple Vulnerabilities (VMSA-2009-0005/VMSA-2009-0007) | Nessus | Windows | high |