Vulnerabilites related to VMware - Fusion
CVE-2024-22270 (GCVE-0-2024-22270)
Vulnerability from cvelistv5
Published
2024-05-14 12:59
Modified
2024-08-15 18:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information disclosure vulnerability
Summary
VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | N/A | VMware Workstation |
Version: 17.x < 17.5.2 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:vmware:workstation:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "workstation", "vendor": "vmware", "versions": [ { "lessThan": "17.5.2", "status": "affected", "version": "-", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fusion", "vendor": "vmware", "versions": [ { "lessThan": "13.5.2", "status": "affected", "version": "-", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22270", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-14T15:34:58.579935Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-15T18:42:55.863Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "VMware Workstation", "vendor": "N/A", "versions": [ { "lessThan": "17.5.2", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "N/A", "versions": [ { "lessThan": "13.5.2", "status": "affected", "version": "13.x", "versionType": "custom" } ] } ], "datePublic": "2024-05-14T04:50:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality.\u00a0A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-14T12:59:55.158Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22270", "datePublished": "2024-05-14T12:59:55.158Z", "dateReserved": "2024-01-08T18:43:17.079Z", "dateUpdated": "2024-08-15T18:42:55.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22253 (GCVE-0-2024-22253)
Vulnerability from cvelistv5
Published
2024-03-05 17:57
Modified
2024-08-16 19:12
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | n/a | VMware ESXi |
Version: 8.0 < ESXi80U2sb-23305545 Version: 8.0 < ESXi80U1d-23299997 Version: 7.0 < ESXi70U3p-23307199 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "esxi", "vendor": "vmware", "versions": [ { "lessThan": "esxi80U2sb-23305545", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "esxi80U1d-23299997", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "esxi70U3p-23307199", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "vmware_workstation", "vendor": "vmware", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fusion", "vendor": "vmware", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "cloud_foundation", "vendor": "vmware", "versions": [ { "lessThan": "6.0", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22253", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T19:27:18.749572Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-16T19:12:32.633Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "VMware ESXi", "vendor": "n/a", "versions": [ { "lessThan": "ESXi80U2sb-23305545", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi80U1d-23299997", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3p-23307199", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Workstation", "vendor": "n/a", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "5.x" }, { "status": "affected", "version": "4.x" } ] } ], "datePublic": "2024-03-05T04:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller.\u0026nbsp;A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-05T17:57:42.445Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Use-after-free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22253", "datePublished": "2024-03-05T17:57:27.297Z", "dateReserved": "2024-01-08T18:43:15.942Z", "dateUpdated": "2024-08-16T19:12:32.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2449 (GCVE-0-2012-2449)
Vulnerability from cvelistv5
Published
2012-05-04 16:00
Modified
2024-08-06 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:25.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "81694", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81694" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "name": "oval:org.mitre.oval:def:16863", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863" }, { "name": "49032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49032" }, { "name": "53369", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53369" }, { "name": "vmware-esxserver-floppy-priv-esc(75376)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75376" }, { "name": "1027019", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027019" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-13T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "81694", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81694" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "name": "oval:org.mitre.oval:def:16863", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863" }, { "name": "49032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49032" }, { "name": "53369", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53369" }, { "name": "vmware-esxserver-floppy-priv-esc(75376)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75376" }, { "name": "1027019", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027019" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "81694", "refsource": "OSVDB", "url": "http://osvdb.org/81694" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "name": "oval:org.mitre.oval:def:16863", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863" }, { "name": "49032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49032" }, { "name": "53369", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53369" }, { "name": "vmware-esxserver-floppy-priv-esc(75376)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75376" }, { "name": "1027019", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027019" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2449", "datePublished": "2012-05-04T16:00:00", "dateReserved": "2012-05-01T00:00:00", "dateUpdated": "2024-08-06T19:34:25.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22040 (GCVE-0-2021-22040)
Vulnerability from cvelistv5
Published
2022-02-16 16:37
Modified
2024-08-03 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi , Workstation, Fusion and VMware Cloud Foundation |
Version: VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:30:24.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi , Workstation, Fusion and VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-16T16:37:53", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2021-22040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi , Workstation, Fusion and VMware Cloud Foundation", "version": { "version_data": [ { "version_value": "VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2021-22040", "datePublished": "2022-02-16T16:37:53", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:30:24.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2336 (GCVE-0-2015-2336)
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:15.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032529", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75095" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032530" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2336", "datePublished": "2015-06-13T14:00:00", "dateReserved": "2015-03-18T00:00:00", "dateUpdated": "2024-08-06T05:10:15.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6983 (GCVE-0-2018-6983)
Vulnerability from cvelistv5
Published
2018-11-27 17:00
Modified
2024-08-05 06:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Integer overflow vulnerability
Summary
VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5) contain an integer overflow vulnerability in the virtual network devices. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware Workstation and Fusion |
Version: VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0030.html" }, { "name": "105986", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105986" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Workstation and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5)" } ] } ], "datePublic": "2018-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5) contain an integer overflow vulnerability in the virtual network devices. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-28T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0030.html" }, { "name": "105986", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105986" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2018-6983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Workstation and Fusion", "version": { "version_data": [ { "version_value": "VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5) contain an integer overflow vulnerability in the virtual network devices. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0030.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0030.html" }, { "name": "105986", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105986" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6983", "datePublished": "2018-11-27T17:00:00", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-08-05T06:17:17.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6962 (GCVE-0-2018-6962)
Vulnerability from cvelistv5
Published
2018-05-22 13:00
Modified
2024-09-16 23:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Signature bypass vulnerability
Summary
VMware Fusion (10.x before 10.1.2) contains a signature bypass vulnerability which may lead to a local privilege escalation.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104235", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104235" }, { "name": "1040957", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.2" } ] } ], "datePublic": "2018-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Fusion (10.x before 10.1.2) contains a signature bypass vulnerability which may lead to a local privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Signature bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-23T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "104235", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104235" }, { "name": "1040957", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-05-21T00:00:00", "ID": "CVE-2018-6962", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Fusion (10.x before 10.1.2) contains a signature bypass vulnerability which may lead to a local privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Signature bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "104235", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104235" }, { "name": "1040957", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040957" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6962", "datePublished": "2018-05-22T13:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T23:15:38.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3981 (GCVE-0-2020-3981)
Vulnerability from cvelistv5
Published
2020-10-20 16:08
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, Workstation, Fusion |
Version: VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T16:08:56", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3981", "datePublished": "2020-10-20T16:08:56", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1787 (GCVE-0-2011-1787)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44904", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44904" }, { "name": "48098", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48098" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "44840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/8711677" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-11T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "44904", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44904" }, { "name": "48098", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48098" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "44840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/8711677" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44904", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44904" }, { "name": "48098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48098" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "44840", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/8711677" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1787", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22268 (GCVE-0-2024-22268)
Vulnerability from cvelistv5
Published
2024-05-14 12:58
Modified
2025-03-27 15:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap buffer-overflow vulnerability
Summary
VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality. A malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | N/A | VMware Workstation |
Version: 17.x < 17.5.2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22268", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T17:13:52.572920Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T15:00:11.156Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "VMware Workstation", "vendor": "N/A", "versions": [ { "lessThan": "17.5.2", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "N/A", "versions": [ { "lessThan": "13.5.2", "status": "affected", "version": "13.x", "versionType": "git" } ] } ], "datePublic": "2024-05-14T04:45:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality.\u0026nbsp;\u003c/span\u003eA malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality.\u00a0A malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer-overflow vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-14T12:58:50.881Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22268", "datePublished": "2024-05-14T12:58:50.881Z", "dateReserved": "2024-01-08T18:43:17.079Z", "dateUpdated": "2025-03-27T15:00:11.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4949 (GCVE-0-2017-4949)
Vulnerability from cvelistv5
Published
2018-01-11 14:00
Modified
2024-09-16 22:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation Pro / Player |
Version: 14.x before 14.1.1 Version: 12.x before 12.5.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.404Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040161", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040161" }, { "name": "102489", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102489" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation Pro / Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.1" }, { "status": "affected", "version": "12.x before 12.5.9" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.1" }, { "status": "affected", "version": "8.x before 8.5.10" } ] } ], "datePublic": "2017-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-12T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1040161", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040161" }, { "name": "102489", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102489" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-01-10T00:00:00", "ID": "CVE-2017-4949", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation Pro / Player", "version": { "version_data": [ { "version_value": "14.x before 14.1.1" }, { "version_value": "12.x before 12.5.9" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.1" }, { "version_value": "8.x before 8.5.10" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "1040161", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040161" }, { "name": "102489", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102489" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4949", "datePublished": "2018-01-11T14:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-16T22:46:45.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2145 (GCVE-0-2011-2145)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error."
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44904", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44904" }, { "name": "48098", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48098" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "vmware-mountvmhgfs-privilege-esc(67815)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815" }, { "name": "44840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/8711677" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \"procedural error.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "44904", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44904" }, { "name": "48098", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48098" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "vmware-mountvmhgfs-privilege-esc(67815)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815" }, { "name": "44840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/8711677" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \"procedural error.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44904", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44904" }, { "name": "48098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48098" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "vmware-mountvmhgfs-privilege-esc(67815)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815" }, { "name": "44840", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/8711677" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2145", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-05-17T00:00:00", "dateUpdated": "2024-08-06T22:53:17.007Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1666 (GCVE-0-2012-1666)
Vulnerability from cvelistv5
Published
2012-09-08 10:00
Modified
2024-09-17 01:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in VMware Tools in VMware Workstation before 8.0.4, VMware Player before 4.0.4, VMware Fusion before 4.1.2, VMware View before 5.1, and VMware ESX 4.1 before U3 and 5.0 before P03 allows local users to gain privileges via a Trojan horse tpfc.dll file in the current working directory.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20120904 VMWare Tools susceptible to binary planting by hijack", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in VMware Tools in VMware Workstation before 8.0.4, VMware Player before 4.0.4, VMware Fusion before 4.1.2, VMware View before 5.1, and VMware ESX 4.1 before U3 and 5.0 before P03 allows local users to gain privileges via a Trojan horse tpfc.dll file in the current working directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-08T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20120904 VMWare Tools susceptible to binary planting by hijack", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in VMware Tools in VMware Workstation before 8.0.4, VMware Player before 4.0.4, VMware Fusion before 4.1.2, VMware View before 5.1, and VMware ESX 4.1 before U3 and 5.0 before P03 allows local users to gain privileges via a Trojan horse tpfc.dll file in the current working directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20120904 VMWare Tools susceptible to binary planting by hijack", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html" }, { "name": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity", "refsource": "CONFIRM", "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1666", "datePublished": "2012-09-08T10:00:00Z", "dateReserved": "2012-03-15T00:00:00Z", "dateUpdated": "2024-09-17T01:56:57.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22043 (GCVE-0-2021-22043)
Vulnerability from cvelistv5
Published
2022-02-16 16:37
Modified
2024-08-03 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- TOCTOU vulnerability
Summary
VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi and VMware Cloud Foundation |
Version: VMware ESXi(7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878 and 7.0 U1 before ESXi70U1e-19324898) and VMware Cloud Foundation 4.x before 4.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:30:24.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi and VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi(7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878 and 7.0 U1 before ESXi70U1e-19324898) and VMware Cloud Foundation 4.x before 4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "description": "TOCTOU vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-16T16:37:55", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2021-22043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi and VMware Cloud Foundation", "version": { "version_data": [ { "version_value": "VMware ESXi(7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878 and 7.0 U1 before ESXi70U1e-19324898) and VMware Cloud Foundation 4.x before 4.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TOCTOU vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2021-22043", "datePublished": "2022-02-16T16:37:55", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:30:24.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22251 (GCVE-0-2024-22251)
Vulnerability from cvelistv5
Published
2024-02-27 17:35
Modified
2024-11-01 19:23
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device). A malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | n/a | VMware Workstation |
Version: 17.x < 17.5.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:33.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22251", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T19:10:37.257069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T19:23:51.458Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "VMware Workstation", "vendor": "n/a", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device).\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eA malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.\u003c/span\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cbr\u003e" } ], "value": "VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device).\u00a0A malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-27T17:35:31.786Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Out-of-bounds read vulnerability ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22251", "datePublished": "2024-02-27T17:35:31.786Z", "dateReserved": "2024-01-08T18:43:15.942Z", "dateUpdated": "2024-11-01T19:23:51.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3971 (GCVE-0-2020-3971)
Vulnerability from cvelistv5
Published
2020-06-25 14:55
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap overflow vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 6.7 before ESXi670-201904101-SG Version: 6.5 before ESXi650-201907101-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201904101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-201907101-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.0.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-25T14:55:33", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3971", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201904101-SG" }, { "version_value": "6.5 before ESXi650-201907101-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.0.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.0.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3971", "datePublished": "2020-06-25T14:55:33", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-1043 (GCVE-0-2015-1043)
Vulnerability from cvelistv5
Published
2015-01-29 18:00
Modified
2024-08-06 04:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:33:19.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "name": "1031644", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031644" }, { "name": "vmware-cve20151043-dos(100934)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934" }, { "name": "62551", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62551" }, { "name": "72337", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72337" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "name": "1031644", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031644" }, { "name": "vmware-cve20151043-dos(100934)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934" }, { "name": "62551", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62551" }, { "name": "72337", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72337" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "name": "1031644", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031644" }, { "name": "vmware-cve20151043-dos(100934)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934" }, { "name": "62551", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62551" }, { "name": "72337", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72337" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1043", "datePublished": "2015-01-29T18:00:00", "dateReserved": "2015-01-12T00:00:00", "dateUpdated": "2024-08-06T04:33:19.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4295 (GCVE-0-2010-4295)
Vulnerability from cvelistv5
Published
2010-12-06 21:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:13.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "69585", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/69585" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45167", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45167" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42453" }, { "name": "1024819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024820" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "69585", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/69585" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45167", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45167" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42453" }, { "name": "1024819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024820" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "69585", "refsource": "OSVDB", "url": "http://osvdb.org/69585" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45167", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45167" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42453", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42453" }, { "name": "1024819", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024820" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4295", "datePublished": "2010-12-06T21:00:00", "dateReserved": "2010-11-18T00:00:00", "dateUpdated": "2024-08-07T03:43:13.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8370 (GCVE-0-2014-8370)
Vulnerability from cvelistv5
Published
2015-01-29 18:00
Modified
2024-08-06 13:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:47.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#88252465", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN88252465/index.html" }, { "name": "1031642", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031642" }, { "name": "JVNDB-2015-000007", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "name": "62605", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62605" }, { "name": "72338", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72338" }, { "name": "vmware-cve20148370-priv-esc(100933)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933" }, { "name": "62551", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62551" }, { "name": "1031643", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031643" }, { "name": "62669", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62669" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "JVN#88252465", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN88252465/index.html" }, { "name": "1031642", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031642" }, { "name": "JVNDB-2015-000007", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "name": "62605", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62605" }, { "name": "72338", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72338" }, { "name": "vmware-cve20148370-priv-esc(100933)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933" }, { "name": "62551", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62551" }, { "name": "1031643", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031643" }, { "name": "62669", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62669" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#88252465", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN88252465/index.html" }, { "name": "1031642", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031642" }, { "name": "JVNDB-2015-000007", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "name": "62605", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62605" }, { "name": "72338", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72338" }, { "name": "vmware-cve20148370-priv-esc(100933)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933" }, { "name": "62551", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62551" }, { "name": "1031643", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031643" }, { "name": "62669", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62669" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8370", "datePublished": "2015-01-29T18:00:00", "dateReserved": "2014-10-21T00:00:00", "dateUpdated": "2024-08-06T13:18:47.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6972 (GCVE-0-2018-6972)
Vulnerability from cvelistv5
Published
2018-07-25 13:00
Modified
2024-09-16 23:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104884", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104884" }, { "name": "1041356", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041356" }, { "name": "1041357", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041357" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201806401-BG" }, { "status": "affected", "version": "6.5 before ESXi650-201806401-BG" }, { "status": "affected", "version": "6.0 before ESXi600-201806401-BG" }, { "status": "affected", "version": "5.5 before ESXi550-201806401-BG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.2" } ] } ], "datePublic": "2018-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-27T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "104884", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104884" }, { "name": "1041356", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041356" }, { "name": "1041357", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041357" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-07-19T00:00:00", "ID": "CVE-2018-6972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201806401-BG" }, { "version_value": "6.5 before ESXi650-201806401-BG" }, { "version_value": "6.0 before ESXi600-201806401-BG" }, { "version_value": "5.5 before ESXi550-201806401-BG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "14.x before 14.1.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "104884", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104884" }, { "name": "1041356", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041356" }, { "name": "1041357", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041357" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6972", "datePublished": "2018-07-25T13:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T23:06:29.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3999 (GCVE-0-2020-3999)
Vulnerability from cvelistv5
Published
2020-12-21 15:14
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-Service Vulnerability
Summary
VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, VMware Workstation,VMware Fusion and VMware Cloud Foundation |
Version: VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7)and VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, VMware Workstation,VMware Fusion and VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7)and VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine\u0027s vmx process leading to a denial of service condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-Service Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T15:14:08", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, VMware Workstation,VMware Fusion and VMware Cloud Foundation", "version": { "version_data": [ { "version_value": "VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7)and VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine\u0027s vmx process leading to a denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-Service Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3999", "datePublished": "2020-12-21T15:14:08", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4904 (GCVE-0-2017-4904)
Vulnerability from cvelistv5
Published
2017-06-07 18:00
Modified
2024-08-05 14:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution / DoS
Summary
The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 6.5 without patch ESXi650-201703410-SG Version: 6.0 U3 without patch ESXi600-201703401-SG Version: 6.0 U2 without patch ESXi600-201703403-SG Version: 6.0 U1 without patch ESXi600-201703402-SG Version: 5.5 without patch ESXi550-201703401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97165", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97165" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 without patch ESXi650-201703410-SG" }, { "status": "affected", "version": "6.0 U3 without patch ESXi600-201703401-SG" }, { "status": "affected", "version": "6.0 U2 without patch ESXi600-201703403-SG" }, { "status": "affected", "version": "6.0 U1 without patch ESXi600-201703402-SG" }, { "status": "affected", "version": "5.5 without patch ESXi550-201703401-SG" } ] }, { "product": "Workstation Pro / Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x prior to 12.5.5" } ] }, { "product": "Fusion Pro / Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x prior to 8.5.6" } ] } ], "datePublic": "2017-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution / DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "97165", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97165" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2017-4904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 without patch ESXi650-201703410-SG" }, { "version_value": "6.0 U3 without patch ESXi600-201703401-SG" }, { "version_value": "6.0 U2 without patch ESXi600-201703403-SG" }, { "version_value": "6.0 U1 without patch ESXi600-201703402-SG" }, { "version_value": "5.5 without patch ESXi550-201703401-SG" } ] } }, { "product_name": "Workstation Pro / Player", "version": { "version_data": [ { "version_value": "12.x prior to 12.5.5" } ] } }, { "product_name": "Fusion Pro / Fusion", "version": { "version_data": [ { "version_value": "8.x prior to 8.5.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution / DoS" } ] } ] }, "references": { "reference_data": [ { "name": "97165", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97165" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038149" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4904", "datePublished": "2017-06-07T18:00:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-08-05T14:39:41.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5515 (GCVE-0-2019-5515)
Vulnerability from cvelistv5
Published
2019-04-02 14:19
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) and Fusion (11.x before 11.0.3, 10.x before 10.1.6) updates address an out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware Workstation and Fusion |
Version: Workstation 15.x before 15.0.3 Version: Workstation 14.x before 14.1.6 Version: Fusion 11.x before 11.0.3 Version: Fusion 10.x before 10.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-306/" }, { "name": "107634", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/107634" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-516/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Workstation and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "Workstation 15.x before 15.0.3" }, { "status": "affected", "version": "Workstation 14.x before 14.1.6" }, { "status": "affected", "version": "Fusion 11.x before 11.0.3" }, { "status": "affected", "version": "Fusion 10.x before 10.1.6" } ] } ], "datePublic": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) and Fusion (11.x before 11.0.3, 10.x before 10.1.6) updates address an out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-29T17:06:06", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-306/" }, { "name": "107634", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/107634" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-516/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5515", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Workstation and Fusion", "version": { "version_data": [ { "version_value": "Workstation 15.x before 15.0.3" }, { "version_value": "Workstation 14.x before 14.1.6" }, { "version_value": "Fusion 11.x before 11.0.3" }, { "version_value": "Fusion 10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) and Fusion (11.x before 11.0.3, 10.x before 10.1.6) updates address an out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-306/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-306/" }, { "name": "107634", "refsource": "BID", "url": "https://www.securityfocus.com/bid/107634" }, { "name": "https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-516/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-516/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5515", "datePublished": "2019-04-02T14:19:30", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41227 (GCVE-0-2025-41227)
Vulnerability from cvelistv5
Published
2025-05-20 14:24
Modified
2025-06-24 07:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options. A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 8.0 < ESXi80U3se-24659227 Version: 7.0 < ESXi70U3sv-24723868 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41227", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-20T15:59:41.340433Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-20T16:00:12.860Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESXi", "vendor": "VMware", "versions": [ { "lessThan": "ESXi80U3se-24659227", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3sv-24723868", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Cloud Foundation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Platform", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.x, 3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Infrastructure", "vendor": "VMware", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "product": "Workstation", "vendor": "VMware", "versions": [ { "lessThan": "17.6.3", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.6.3", "status": "affected", "version": "13.x", "versionType": "custom" } ] } ], "datePublic": "2025-05-20T11:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware ESXi,\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWorkstation, and Fusion contain a denial-of-service vulnerability due to certain guest options.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition.\u003c/span\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware ESXi,\u00a0Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options.\u00a0A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-24T07:13:30.222Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717" } ], "source": { "discovery": "UNKNOWN" }, "title": "Denial-of-Service Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2025-41227", "datePublished": "2025-05-20T14:24:29.316Z", "dateReserved": "2025-04-16T09:29:46.972Z", "dateUpdated": "2025-06-24T07:13:30.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20869 (GCVE-0-2023-20869)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-02-04 17:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Stack-based buffer-overflow vulnerability in bluetooth device-sharing functionality
Summary
VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Workstation Pro / Player (Workstation) and VMware Fusion |
Version: VMware Workstation (17.x) and VMware Fusion (13.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:21:32.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20869", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T17:14:22.004418Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T17:15:06.088Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "VMware Workstation Pro / Player (Workstation) and VMware Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Workstation (17.x) and VMware Fusion (13.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based buffer-overflow vulnerability in bluetooth device-sharing functionality", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-26T00:00:00.000Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ] } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-20869", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-02-04T17:15:06.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4934 (GCVE-0-2017-4934)
Vulnerability from cvelistv5
Published
2017-11-17 14:00
Modified
2024-09-16 20:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap buffer-overflow vulnerability
Summary
VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 12.x before 12.5.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "name": "101903", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101903" }, { "name": "1039835", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039835" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x before 12.5.8" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x before 8.5.9" } ] } ], "datePublic": "2017-11-16T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap buffer-overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-22T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "name": "101903", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101903" }, { "name": "1039835", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039835" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-11-16T00:00:00", "ID": "CVE-2017-4934", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "12.x before 12.5.8" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "8.x before 8.5.9" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap buffer-overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "name": "101903", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101903" }, { "name": "1039835", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039835" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4934", "datePublished": "2017-11-17T14:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-16T20:47:54.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4296 (GCVE-0-2010-4296)
Vulnerability from cvelistv5
Published
2010-12-06 21:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45168", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45168" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42453" }, { "name": "1024819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024820" }, { "name": "69584", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/69584" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45168", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45168" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42453" }, { "name": "1024819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024820" }, { "name": "69584", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/69584" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45168", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45168" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42453", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42453" }, { "name": "1024819", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024820" }, { "name": "69584", "refsource": "OSVDB", "url": "http://osvdb.org/69584" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4296", "datePublished": "2010-12-06T21:00:00", "dateReserved": "2010-11-18T00:00:00", "dateUpdated": "2024-08-07T03:43:14.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6977 (GCVE-0-2018-6977)
Vulnerability from cvelistv5
Published
2018-10-09 20:00
Modified
2024-09-16 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware ESXi (6.7, 6.5, 6.0), Workstation (15.x and 14.x) and Fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3D-rendering shader. Successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the VM unresponsive, and in some cases, possibly result other VMs on the host or the host itself becoming unresponsive.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105549", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105549" }, { "name": "1041821", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041821" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0025.html" }, { "name": "1041822", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041822" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7, 6.5, 6.0" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x and 14.x" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x and 10.x" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7, 6.5, 6.0), Workstation (15.x and 14.x) and Fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3D-rendering shader. Successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the VM unresponsive, and in some cases, possibly result other VMs on the host or the host itself becoming unresponsive." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "105549", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105549" }, { "name": "1041821", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041821" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0025.html" }, { "name": "1041822", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041822" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-6977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.7, 6.5, 6.0" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x and 14.x" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x and 10.x" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7, 6.5, 6.0), Workstation (15.x and 14.x) and Fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3D-rendering shader. Successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the VM unresponsive, and in some cases, possibly result other VMs on the host or the host itself becoming unresponsive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "105549", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105549" }, { "name": "1041821", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041821" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0025.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0025.html" }, { "name": "1041822", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041822" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6977", "datePublished": "2018-10-09T20:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T20:26:19.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-4004 (GCVE-0-2020-4004)
Vulnerability from cvelistv5
Published
2020-11-20 19:06
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | n/a | VMware ESXi |
Version: 7.0 before ESXi70U1b-17168206 Version: 6.7 before ESXi670-202011101-SG Version: 6.5 before ESXi650-202011301-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "n/a", "versions": [ { "status": "affected", "version": "7.0 before ESXi70U1b-17168206" }, { "status": "affected", "version": "6.7 before ESXi670-202011101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202011301-SG" } ] }, { "product": "Workstation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "15.x before 15.5.7" } ] }, { "product": "Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "11.x before 11.5.7" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-20T19:06:28", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-4004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi70U1b-17168206" }, { "version_value": "6.7 before ESXi670-202011101-SG" }, { "version_value": "6.5 before ESXi650-202011301-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.7" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-4004", "datePublished": "2020-11-20T19:06:28", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3959 (GCVE-0-2020-3959)
Vulnerability from cvelistv5
Published
2020-05-29 19:49
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine's vmx process leading to a partial denial of service.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "VMware Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.1.0" } ] }, { "product": "VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine\u0027s vmx process leading to a partial denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-29T19:49:35", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "VMware Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.1.0" } ] } }, { "product_name": "VMware Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.1.0" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine\u0027s vmx process leading to a partial denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3959", "datePublished": "2020-05-29T19:49:35", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3970 (GCVE-0-2020-3970)
Vulnerability from cvelistv5
Published
2020-06-25 14:37
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine's vmx process leading to a partial denial of service condition.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-782/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.5" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine\u0027s vmx process leading to a partial denial of service condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-30T15:06:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-782/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.5" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.5" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine\u0027s vmx process leading to a partial denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-782/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-782/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3970", "datePublished": "2020-06-25T14:37:44", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5521 (GCVE-0-2019-5521)
Vulnerability from cvelistv5
Published
2019-09-20 18:00
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out of bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 6.7 before ESXi670-201904101-SG Version: 6.5 before ESXi650-201903001 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0012.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201904101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-201903001" } ] }, { "product": "VMware Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.0.3" }, { "status": "affected", "version": "14.x before 14.1.6" } ] }, { "product": "VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.0.3" }, { "status": "affected", "version": "10.x before 10.1.6" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ], "problemTypes": [ { "descriptions": [ { "description": "Out of bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-20T18:01:04", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0012.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201904101-SG" }, { "version_value": "6.5 before ESXi650-201903001" } ] } }, { "product_name": "VMware Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.0.3" }, { "version_value": "14.x before 14.1.6" } ] } }, { "product_name": "VMware Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.0.3" }, { "version_value": "10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out of bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0012.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0012.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5521", "datePublished": "2019-09-20T18:00:52", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4297 (GCVE-0-2010-4297)
Vulnerability from cvelistv5
Published
2010-12-06 21:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a "command injection" issue.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "69590", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/69590" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45166", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45166" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42480" }, { "name": "1024819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024820" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a \"command injection\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "69590", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/69590" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45166", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45166" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42480" }, { "name": "1024819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024820" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a \"command injection\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "name": "69590", "refsource": "OSVDB", "url": "http://osvdb.org/69590" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "name": "45166", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45166" }, { "name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "name": "42480", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42480" }, { "name": "1024819", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024819" }, { "name": "42482", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42482" }, { "name": "ADV-2010-3116", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "name": "1024820", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024820" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4297", "datePublished": "2010-12-06T21:00:00", "dateReserved": "2010-11-18T00:00:00", "dateUpdated": "2024-08-07T03:43:14.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5329 (GCVE-0-2016-5329)
Vulnerability from cvelistv5
Published
2016-12-29 09:02
Modified
2024-08-06 01:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:00:57.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1037103", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037103" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html" }, { "name": "93888", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93888" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1037103", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037103" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html" }, { "name": "93888", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93888" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1037103", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037103" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html" }, { "name": "93888", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93888" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-5329", "datePublished": "2016-12-29T09:02:00", "dateReserved": "2016-06-07T00:00:00", "dateUpdated": "2024-08-06T01:00:57.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1518 (GCVE-0-2012-1518)
Vulnerability from cvelistv5
Published
2012-04-17 21:00
Modified
2024-08-06 19:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:01.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48782" }, { "name": "81163", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81163" }, { "name": "1026922", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026922" }, { "name": "53006", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53006" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html" }, { "name": "oval:org.mitre.oval:def:16745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745" }, { "name": "1026923", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026923" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "48782", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48782" }, { "name": "81163", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81163" }, { "name": "1026922", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026922" }, { "name": "53006", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53006" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html" }, { "name": "oval:org.mitre.oval:def:16745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745" }, { "name": "1026923", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026923" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48782", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48782" }, { "name": "81163", "refsource": "OSVDB", "url": "http://osvdb.org/81163" }, { "name": "1026922", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026922" }, { "name": "53006", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53006" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html" }, { "name": "oval:org.mitre.oval:def:16745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745" }, { "name": "1026923", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026923" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1518", "datePublished": "2012-04-17T21:00:00", "dateReserved": "2012-03-08T00:00:00", "dateUpdated": "2024-08-06T19:01:01.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2338 (GCVE-0-2015-2338)
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:15.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75092" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75092" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032529", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75092" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032530" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2338", "datePublished": "2015-06-13T14:00:00", "dateReserved": "2015-03-18T00:00:00", "dateUpdated": "2024-08-06T05:10:15.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2450 (GCVE-0-2012-2450)
Vulnerability from cvelistv5
Published
2012-05-04 16:00
Modified
2024-08-06 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:25.763Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "esxserver-scsi-priv-esc(75377)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75377" }, { "name": "oval:org.mitre.oval:def:16852", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "name": "49032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49032" }, { "name": "53369", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53369" }, { "name": "81695", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81695" }, { "name": "1027019", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027019" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-13T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "esxserver-scsi-priv-esc(75377)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75377" }, { "name": "oval:org.mitre.oval:def:16852", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "name": "49032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49032" }, { "name": "53369", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53369" }, { "name": "81695", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81695" }, { "name": "1027019", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027019" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "esxserver-scsi-priv-esc(75377)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75377" }, { "name": "oval:org.mitre.oval:def:16852", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "name": "49032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49032" }, { "name": "53369", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53369" }, { "name": "81695", "refsource": "OSVDB", "url": "http://osvdb.org/81695" }, { "name": "1027019", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027019" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2450", "datePublished": "2012-05-04T16:00:00", "dateReserved": "2012-05-01T00:00:00", "dateUpdated": "2024-08-06T19:34:25.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22041 (GCVE-0-2021-22041)
Vulnerability from cvelistv5
Published
2022-02-16 16:37
Modified
2024-08-03 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Double-fetch vulnerability
Summary
VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi , Workstation, Fusion and VMware Cloud Foundation |
Version: VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:30:23.952Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi , Workstation, Fusion and VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Double-fetch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-16T16:37:54", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2021-22041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi , Workstation, Fusion and VMware Cloud Foundation", "version": { "version_data": [ { "version_value": "VMware ESXi (7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878, 7.0 U1 before ESXi70U1e-19324898, ESXi 6.7 before ESXi670-202111101-SG and ESXi 6.5 ESXi650-202202401-SG), Workstation (16.x before 16.2.1), Fusion (12.x before 12.2.1) and VMware Cloud Foundation (4.x before 4.4 and 3.x before 3.11)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double-fetch vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2021-22041", "datePublished": "2022-02-16T16:37:54", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:30:23.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3969 (GCVE-0-2020-3969)
Vulnerability from cvelistv5
Published
2020-06-24 16:00
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap-overflow vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-786/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.5" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-30T15:06:04", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-786/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.5" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.5" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-786/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-786/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3969", "datePublished": "2020-06-24T16:00:46", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0177 (GCVE-0-2009-0177)
Vulnerability from cvelistv5
Published
2009-01-20 15:26
Modified
2024-08-07 04:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:24:18.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:6433", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433" }, { "name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html" }, { "name": "33372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33372" }, { "name": "34373", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34373" }, { "name": "ADV-2009-0024", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0024" }, { "name": "51180", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/51180" }, { "name": "7647", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/7647" }, { "name": "1021512", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021512" }, { "name": "ADV-2009-0944", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "name": "34601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34601" }, { "name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-02T00:00:00", "descriptions": [ { "lang": "en", "value": "vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:6433", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433" }, { "name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html" }, { "name": "33372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33372" }, { "name": "34373", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34373" }, { "name": "ADV-2009-0024", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0024" }, { "name": "51180", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/51180" }, { "name": "7647", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/7647" }, { "name": "1021512", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021512" }, { "name": "ADV-2009-0944", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "name": "34601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34601" }, { "name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:6433", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433" }, { "name": "20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html" }, { "name": "33372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33372" }, { "name": "34373", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34373" }, { "name": "ADV-2009-0024", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0024" }, { "name": "51180", "refsource": "OSVDB", "url": "http://osvdb.org/51180" }, { "name": "7647", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/7647" }, { "name": "1021512", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021512" }, { "name": "ADV-2009-0944", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "name": "34601", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34601" }, { "name": "[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0177", "datePublished": "2009-01-20T15:26:00", "dateReserved": "2009-01-20T00:00:00", "dateUpdated": "2024-08-07T04:24:18.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3974 (GCVE-0-2020-3974)
Vulnerability from cvelistv5
Published
2020-07-10 13:14
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation vulnerability
Summary
VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac |
Version: VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T13:14:45", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac", "version": { "version_data": [ { "version_value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3974", "datePublished": "2020-07-10T13:14:45", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6967 (GCVE-0-2018-6967)
Vulnerability from cvelistv5
Published
2018-07-09 20:00
Modified
2024-09-17 03:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6966.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi, Workstation, and Fusion |
Version: VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104709", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041208" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2)" } ] } ], "datePublic": "2018-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6966." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-12T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "104709", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041208" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-06-28T00:00:00", "ID": "CVE-2018-6967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, and Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6966." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "104709", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041208" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6967", "datePublished": "2018-07-09T20:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-17T03:32:54.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5518 (GCVE-0-2019-5518)
Vulnerability from cvelistv5
Published
2019-04-01 20:39
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read/write vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain an out-of-bounds read/write vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi, Workstation, Fusion |
Version: ESXi 6.7 before ESXi670-201903001 Version: ESXi 6.5 before ESXi650-201903001 Version: ESXi 6.0 before ESXi600-201903001 Version: Workstation 15.x before 15.0.4 Version: Workstation 14.x before 14.1.7 Version: Fusion 11.x before 11.0.3 Version: Fusion 10.x before 10.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107541", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-421/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "ESXi 6.7 before ESXi670-201903001" }, { "status": "affected", "version": "ESXi 6.5 before ESXi650-201903001" }, { "status": "affected", "version": "ESXi 6.0 before ESXi600-201903001" }, { "status": "affected", "version": "Workstation 15.x before 15.0.4" }, { "status": "affected", "version": "Workstation 14.x before 14.1.7" }, { "status": "affected", "version": "Fusion 11.x before 11.0.3" }, { "status": "affected", "version": "Fusion 10.x before 10.1.6" } ] } ], "datePublic": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain an out-of-bounds read/write vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read/write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-10T06:06:00", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "107541", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107541" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-421/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, Fusion", "version": { "version_data": [ { "version_value": "ESXi 6.7 before ESXi670-201903001" }, { "version_value": "ESXi 6.5 before ESXi650-201903001" }, { "version_value": "ESXi 6.0 before ESXi600-201903001" }, { "version_value": "Workstation 15.x before 15.0.4" }, { "version_value": "Workstation 14.x before 14.1.7" }, { "version_value": "Fusion 11.x before 11.0.3" }, { "version_value": "Fusion 10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain an out-of-bounds read/write vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read/write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "107541", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107541" }, { "name": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-421/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-421/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5518", "datePublished": "2019-04-01T20:39:57", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5540 (GCVE-0-2019-5540)
Vulnerability from cvelistv5
Published
2019-11-20 15:10
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information disclosure vulnerability
Summary
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | Workstation and Fusion |
Version: Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-20T15:10:59", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5540", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation and Fusion", "version": { "version_data": [ { "version_value": "Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5540", "datePublished": "2019-11-20T15:10:59", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2098 (GCVE-0-2008-2098)
Vulnerability from cvelistv5
Published
2008-06-02 14:00
Modified
2024-08-07 08:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:49:57.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0008.html" }, { "name": "vmware-hgfs-bo(42753)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42753" }, { "name": "1020148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020148" }, { "name": "20080530 VMSA-2008-0008 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion resolve critical security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/492831/100/0/threaded" }, { "name": "ADV-2008-1707", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1707/references" }, { "name": "30476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30476" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0008.html" }, { "name": "vmware-hgfs-bo(42753)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42753" }, { "name": "1020148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020148" }, { "name": "20080530 VMSA-2008-0008 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion resolve critical security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/492831/100/0/threaded" }, { "name": "ADV-2008-1707", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1707/references" }, { "name": "30476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30476" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0008.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0008.html" }, { "name": "vmware-hgfs-bo(42753)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42753" }, { "name": "1020148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020148" }, { "name": "20080530 VMSA-2008-0008 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion resolve critical security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/492831/100/0/threaded" }, { "name": "ADV-2008-1707", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1707/references" }, { "name": "30476", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30476" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2098", "datePublished": "2008-06-02T14:00:00", "dateReserved": "2008-05-07T00:00:00", "dateUpdated": "2024-08-07T08:49:57.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41236 (GCVE-0-2025-41236)
Vulnerability from cvelistv5
Published
2025-07-15 18:34
Modified
2025-07-16 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter. A malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 8.0 < ESXi80U3f-24784735 Version: 8.0 < ESXi80U2e-24789317 Version: 7.0 < ESXi70U3w-24784741 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41236", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-16T03:55:58.257Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESXi", "vendor": "VMware", "versions": [ { "lessThan": "ESXi80U3f-24784735", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi80U2e-24789317", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3w-24784741", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Cloud Foundation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "Workstation", "vendor": "VMware", "versions": [ { "lessThan": "17.6.4", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThanOrEqual": "13.6.4", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Platform", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.x, 3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Infrastructure", "vendor": "VMware", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] } ], "datePublic": "2025-07-15T03:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter.\u00a0A malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-15T18:34:12.719Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877" } ], "source": { "discovery": "UNKNOWN" }, "title": "VMXNET3 integer-overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2025-41236", "datePublished": "2025-07-15T18:34:12.719Z", "dateReserved": "2025-04-16T09:30:17.798Z", "dateUpdated": "2025-07-16T03:55:58.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6981 (GCVE-0-2018-6981)
Vulnerability from cvelistv5
Published
2018-12-04 14:00
Modified
2024-08-05 06:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- uninitialized stack memory
Summary
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi, VMware Workstation, and VMware Fusion |
Version: VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.343Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1042055", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042055" }, { "name": "105881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" }, { "name": "1042054", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042054" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, VMware Workstation, and VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "uninitialized stack memory", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-05T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1042055", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042055" }, { "name": "105881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" }, { "name": "1042054", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042054" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2018-6981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, VMware Workstation, and VMware Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "uninitialized stack memory" } ] } ] }, "references": { "reference_data": [ { "name": "1042055", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042055" }, { "name": "105881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105881" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" }, { "name": "1042054", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042054" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6981", "datePublished": "2018-12-04T14:00:00", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-08-05T06:17:17.343Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3964 (GCVE-0-2020-3964)
Vulnerability from cvelistv5
Published
2020-06-25 14:51
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Leak
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor's memory. Additional conditions beyond the attacker's control need to be present for exploitation to be possible.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202006401-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202006401-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor\u0027s memory. Additional conditions beyond the attacker\u0027s control need to be present for exploitation to be possible." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-17T20:06:10", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3964", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202006401-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor\u0027s memory. Additional conditions beyond the attacker\u0027s control need to be present for exploitation to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Leak" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "name": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3964", "datePublished": "2020-06-25T14:51:48", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1141 (GCVE-0-2010-1141)
Vulnerability from cvelistv5
Published
2010-04-12 18:00
Modified
2024-08-07 01:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "1023833", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023833" }, { "name": "39198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39198" }, { "name": "1023832", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023832" }, { "name": "oval:org.mitre.oval:def:7020", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "1023833", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023833" }, { "name": "39198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39198" }, { "name": "1023832", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023832" }, { "name": "oval:org.mitre.oval:def:7020", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "1023833", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023833" }, { "name": "39198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39198" }, { "name": "1023832", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023832" }, { "name": "oval:org.mitre.oval:def:7020", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1141", "datePublished": "2010-04-12T18:00:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:06.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4945 (GCVE-0-2017-4945)
Vulnerability from cvelistv5
Published
2018-01-05 14:00
Modified
2024-09-17 00:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Guest access control vulnerability
Summary
VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 14.x Version: 12.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040109", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040109" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html" }, { "name": "102441", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102441" }, { "name": "1040136", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040136" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x" }, { "status": "affected", "version": "12.x" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x" }, { "status": "affected", "version": "8.x" } ] } ], "datePublic": "2018-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default." } ], "problemTypes": [ { "descriptions": [ { "description": "Guest access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-13T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1040109", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040109" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html" }, { "name": "102441", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102441" }, { "name": "1040136", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040136" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-01-04T00:00:00", "ID": "CVE-2017-4945", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "14.x" }, { "version_value": "12.x" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x" }, { "version_value": "8.x" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Guest access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "1040109", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040109" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html" }, { "name": "102441", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102441" }, { "name": "1040136", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040136" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4945", "datePublished": "2018-01-05T14:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T00:11:23.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20870 (GCVE-0-2023-20870)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-02-04 17:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information disclosure vulnerability in bluetooth device-sharing functionality
Summary
VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Workstation Pro / Player (Workstation) and VMware Fusion |
Version: VMware Workstation (17.x) and VMware Fusion (13.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:21:32.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20870", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T17:13:07.295105Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T17:13:12.192Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "VMware Workstation Pro / Player (Workstation) and VMware Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Workstation (17.x) and VMware Fusion (13.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability in bluetooth device-sharing functionality", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T00:00:00.000Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ] } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-20870", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-02-04T17:13:12.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2100 (GCVE-0-2008-2100)
Vulnerability from cvelistv5
Published
2008-06-05 20:21
Modified
2024-08-07 08:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:49:57.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2008-1744", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1744" }, { "name": "1020200", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020200" }, { "name": "vmware-vixapi-multiple-unspecified-bo(42872)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872" }, { "name": "oval:org.mitre.oval:def:5647", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html" }, { "name": "30556", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30556" }, { "name": "oval:org.mitre.oval:def:5081", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081" }, { "name": "29552", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29552" }, { "name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded" }, { "name": "3922", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2008-1744", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1744" }, { "name": "1020200", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020200" }, { "name": "vmware-vixapi-multiple-unspecified-bo(42872)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872" }, { "name": "oval:org.mitre.oval:def:5647", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html" }, { "name": "30556", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30556" }, { "name": "oval:org.mitre.oval:def:5081", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081" }, { "name": "29552", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29552" }, { "name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded" }, { "name": "3922", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3922" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2008-1744", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1744" }, { "name": "1020200", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020200" }, { "name": "vmware-vixapi-multiple-unspecified-bo(42872)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872" }, { "name": "oval:org.mitre.oval:def:5647", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html" }, { "name": "30556", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30556" }, { "name": "oval:org.mitre.oval:def:5081", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081" }, { "name": "29552", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29552" }, { "name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded" }, { "name": "3922", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3922" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2100", "datePublished": "2008-06-05T20:21:00", "dateReserved": "2008-05-07T00:00:00", "dateUpdated": "2024-08-07T08:49:57.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5535 (GCVE-0-2019-5535)
Vulnerability from cvelistv5
Published
2019-10-10 16:29
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Network denial-of-service vulnerability
Summary
VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Workstation and Fusion |
Version: VMware Workstation 15.x and Fusion 11.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Workstation and Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Workstation 15.x and Fusion 11.x" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7." } ], "problemTypes": [ { "descriptions": [ { "description": "Network denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-10T16:29:16", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Workstation and Fusion", "version": { "version_data": [ { "version_value": "VMware Workstation 15.x and Fusion 11.x" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Network denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5535", "datePublished": "2019-10-10T16:29:16", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3947 (GCVE-0-2020-3947)
Vulnerability from cvelistv5
Published
2020-03-16 17:21
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 15.x before 15.5.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-16T17:21:09", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3947", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3947", "datePublished": "2020-03-16T17:21:09", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1805 (GCVE-0-2009-1805)
Vulnerability from cvelistv5
Published
2009-06-01 19:00
Modified
2024-08-07 05:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35269", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35269" }, { "name": "35141", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35141" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "name": "oval:org.mitre.oval:def:6130", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130" }, { "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "name": "ADV-2009-1452", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1452" }, { "name": "1022300", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022300" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35269", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35269" }, { "name": "35141", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35141" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "name": "oval:org.mitre.oval:def:6130", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130" }, { "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "name": "ADV-2009-1452", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1452" }, { "name": "1022300", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022300" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1805", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35269", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35269" }, { "name": "35141", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35141" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "name": "oval:org.mitre.oval:def:6130", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130" }, { "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "name": "ADV-2009-1452", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1452" }, { "name": "1022300", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022300" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1805", "datePublished": "2009-06-01T19:00:00", "dateReserved": "2009-05-28T00:00:00", "dateUpdated": "2024-08-07T05:27:54.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4924 (GCVE-0-2017-4924)
Vulnerability from cvelistv5
Published
2017-09-15 13:00
Modified
2024-09-17 02:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039365", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039365" }, { "name": "100843", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100843" }, { "name": "1039366", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 without patch ESXi650-201707101-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x before 12.5.7" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x before 8.5.8" } ] } ], "datePublic": "2017-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-09T13:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1039365", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039365" }, { "name": "100843", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100843" }, { "name": "1039366", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-09-14T00:00:00", "ID": "CVE-2017-4924", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 without patch ESXi650-201707101-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "12.x before 12.5.7" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "8.x before 8.5.8" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "1039365", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039365" }, { "name": "100843", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100843" }, { "name": "1039366", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039366" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "name": "https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html", "refsource": "MISC", "url": "https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4924", "datePublished": "2017-09-15T13:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T02:20:43.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3282 (GCVE-0-2009-3282)
Vulnerability from cvelistv5
Published
2009-10-16 16:00
Modified
2024-09-16 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 allows host OS users to cause a denial of service to the host OS via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:22:24.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[security-announce] 20091001 VMSA-2009-0013 VMware Fusion resolves two security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "name": "ADV-2009-2811", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "name": "36928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36928" }, { "name": "1022981", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022981" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow in the vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 allows host OS users to cause a denial of service to the host OS via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-10-16T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[security-announce] 20091001 VMSA-2009-0013 VMware Fusion resolves two security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "name": "ADV-2009-2811", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "name": "36928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36928" }, { "name": "1022981", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022981" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3282", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 allows host OS users to cause a denial of service to the host OS via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[security-announce] 20091001 VMSA-2009-0013 VMware Fusion resolves two security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "name": "ADV-2009-2811", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "name": "36928", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36928" }, { "name": "1022981", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022981" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3282", "datePublished": "2009-10-16T16:00:00Z", "dateReserved": "2009-09-21T00:00:00Z", "dateUpdated": "2024-09-16T22:15:47.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3967 (GCVE-0-2020-3967)
Vulnerability from cvelistv5
Published
2020-06-25 14:39
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap-overflow vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-784/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.5" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-30T15:06:03", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-784/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.5" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.5" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-784/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-784/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3967", "datePublished": "2020-06-25T14:39:21", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41238 (GCVE-0-2025-41238)
Vulnerability from cvelistv5
Published
2025-07-15 18:34
Modified
2025-07-16 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 8.0 < ESXi80U3f-24784735 Version: 8.0 < ESXi80U2e-24789317 Version: 7.0 < ESXi70U3w-24784741 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41238", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-16T03:56:00.818Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESXi", "vendor": "VMware", "versions": [ { "lessThan": "ESXi80U3f-24784735", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi80U2e-24789317", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3w-24784741", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Cloud Foundation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "Workstation", "vendor": "VMware", "versions": [ { "lessThan": "17.6.4", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.6.4", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Platform", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.x, 3.x, 2.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Infrastructure", "vendor": "VMware", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] } ], "datePublic": "2025-07-15T03:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-15T18:34:48.818Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877" } ], "source": { "discovery": "UNKNOWN" }, "title": "PVSCSI heap-overflow vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2025-41238", "datePublished": "2025-07-15T18:34:48.818Z", "dateReserved": "2025-04-16T09:30:17.798Z", "dateUpdated": "2025-07-16T03:56:00.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3965 (GCVE-0-2020-3965)
Vulnerability from cvelistv5
Published
2020-06-25 14:54
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Leak
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202006401-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202006401-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-17T20:06:09", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202006401-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Leak" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "name": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3965", "datePublished": "2020-06-25T14:54:46", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3960 (GCVE-0-2020-3960)
Vulnerability from cvelistv5
Published
2021-09-15 12:14
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, Workstation, and Fusion |
Version: VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, and Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T12:14:02", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, and Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3960", "datePublished": "2021-09-15T12:14:02", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34044 (GCVE-0-2023-34044)
Vulnerability from cvelistv5
Published
2023-10-20 08:56
Modified
2024-08-02 16:01
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds
read vulnerability that exists in the functionality for sharing host
Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual
machine may be able to read privileged information contained in
hypervisor memory from a virtual machine.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 17.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:52.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS", "Linux", "iOS", "Android", "x86", "ARM", "64 bit", "32 bit" ], "product": "Workstation", "vendor": "VMware", "versions": [ { "lessThan": "17.5", "status": "affected", "version": "17.x", "versionType": "17.5" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.5", "status": "affected", "version": "13.x", "versionType": "13.5" } ] } ], "datePublic": "2023-10-19T18:29:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds \nread vulnerability that exists in the functionality for sharing host \nBluetooth devices with the virtual machine.\u0026nbsp;A malicious actor with local administrative privileges on a virtual \nmachine may be able to read privileged information contained in \nhypervisor memory from a virtual machine." } ], "value": "VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds \nread vulnerability that exists in the functionality for sharing host \nBluetooth devices with the virtual machine.\u00a0A malicious actor with local administrative privileges on a virtual \nmachine may be able to read privileged information contained in \nhypervisor memory from a virtual machine." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T08:56:53.136Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information disclosure vulnerability in bluetooth device-sharing functionality", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-34044", "datePublished": "2023-10-20T08:56:53.136Z", "dateReserved": "2023-05-25T17:21:56.202Z", "dateUpdated": "2024-08-02T16:01:52.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6965 (GCVE-0-2018-6965)
Vulnerability from cvelistv5
Published
2018-07-09 20:00
Modified
2024-09-17 01:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6966 and CVE-2018-6967.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi, Workstation, and Fusion |
Version: VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104709", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041208" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2)" } ] } ], "datePublic": "2018-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6966 and CVE-2018-6967." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-12T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "104709", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041208" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-06-28T00:00:00", "ID": "CVE-2018-6965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, and Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6966 and CVE-2018-6967." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "104709", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041208" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6965", "datePublished": "2018-07-09T20:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-17T01:10:40.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5517 (GCVE-0-2019-5517)
Vulnerability from cvelistv5
Published
2019-04-15 17:20
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Multiple Out-of-bounds read vulnerabilities
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201904101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-201903001" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.0.3" }, { "status": "affected", "version": "14.x before 14.1.6" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.0.3" }, { "status": "affected", "version": "10.x before 10.1.6" } ] } ], "datePublic": "2019-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ], "problemTypes": [ { "descriptions": [ { "description": "Multiple Out-of-bounds read vulnerabilities", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-15T17:20:08", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5517", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201904101-SG" }, { "version_value": "6.5 before ESXi650-201903001" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.0.3" }, { "version_value": "14.x before 14.1.6" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.0.3" }, { "version_value": "10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multiple Out-of-bounds read vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5517", "datePublished": "2019-04-15T17:20:08", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-6933 (GCVE-0-2015-6933)
Vulnerability from cvelistv5
Published
2016-01-09 02:00
Modified
2024-08-06 07:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:36:34.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034604", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034604" }, { "name": "1034603", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034603" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1034604", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034604" }, { "name": "1034603", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034603" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034604", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034604" }, { "name": "1034603", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034603" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6933", "datePublished": "2016-01-09T02:00:00", "dateReserved": "2015-09-14T00:00:00", "dateUpdated": "2024-08-06T07:36:34.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22252 (GCVE-0-2024-22252)
Vulnerability from cvelistv5
Published
2024-03-05 17:57
Modified
2025-03-27 19:50
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | n/a | VMware ESXi |
Version: 8.0 < ESXi80U2sb-23305545 Version: 8.0 < ESXi80U1d-23299997 Version: 7.0 < ESXi70U3p-23307199 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:33.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "esxi", "vendor": "vmware", "versions": [ { "lessThan": "esxi80u2sb-23305545", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "esxi80u1d-23299997", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "esxi70u3p-23307199", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vmware_workstation", "vendor": "vmware", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fusion", "vendor": "vmware", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloud_foundation", "vendor": "vmware", "versions": [ { "lessThan": "6.0", "status": "affected", "version": "4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22252", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-05T19:38:42.748683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-27T19:50:25.416Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "VMware ESXi", "vendor": "n/a", "versions": [ { "lessThan": "ESXi80U2sb-23305545", "status": "affected", "version": "8.0 ", "versionType": "custom" }, { "lessThan": "ESXi80U1d-23299997", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3p-23307199", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Workstation", "vendor": "n/a", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "5.x" }, { "status": "affected", "version": "4.x" } ] } ], "datePublic": "2024-03-05T04:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller.\u0026nbsp;A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-05T17:57:22.043Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Use-after-free vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22252", "datePublished": "2024-03-05T17:57:22.043Z", "dateReserved": "2024-01-08T18:43:15.942Z", "dateUpdated": "2025-03-27T19:50:25.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3281 (GCVE-0-2009-3281)
Vulnerability from cvelistv5
Published
2009-10-16 16:00
Modified
2024-09-17 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:22:24.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[security-announce] 20091001 VMSA-2009-0013 VMware Fusion resolves two security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "name": "ADV-2009-2811", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "name": "36928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36928" }, { "name": "1022981", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022981" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-10-16T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[security-announce] 20091001 VMSA-2009-0013 VMware Fusion resolves two security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "name": "ADV-2009-2811", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "name": "36928", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36928" }, { "name": "1022981", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022981" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[security-announce] 20091001 VMSA-2009-0013 VMware Fusion resolves two security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "name": "ADV-2009-2811", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "name": "36928", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36928" }, { "name": "1022981", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022981" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3281", "datePublished": "2009-10-16T16:00:00Z", "dateReserved": "2009-09-21T00:00:00Z", "dateUpdated": "2024-09-17T00:31:56.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5541 (GCVE-0-2019-5541)
Vulnerability from cvelistv5
Published
2019-11-20 15:11
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | Workstation and Fusion |
Version: Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:50.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-20T15:11:28", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5541", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation and Fusion", "version": { "version_data": [ { "version_value": "Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5541", "datePublished": "2019-11-20T15:11:28", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:50.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34046 (GCVE-0-2023-34046)
Vulnerability from cvelistv5
Published
2023-10-20 08:59
Modified
2025-03-07 18:27
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use)
vulnerability that occurs during installation for the first time (the
user needs to drag or copy the application to a folder from the '.dmg'
volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may
exploit this vulnerability to escalate privileges to root on the system
where Fusion is installed or being installed for the first time.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:52.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-06T15:26:58.702904Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-07T18:27:07.211Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.5", "status": "affected", "version": "13.x", "versionType": "13.5" } ] } ], "datePublic": "2023-10-19T18:29:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) \nvulnerability that occurs during installation for the first time (the \nuser needs to drag or copy the application to a folder from the \u0027.dmg\u0027 \nvolume) or when installing an upgrade.\u0026nbsp;A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time." } ], "value": "VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) \nvulnerability that occurs during installation for the first time (the \nuser needs to drag or copy the application to a folder from the \u0027.dmg\u0027 \nvolume) or when installing an upgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T08:59:08.671Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "VMware Fusion TOCTOU local privilege escalation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-34046", "datePublished": "2023-10-20T08:59:08.671Z", "dateReserved": "2023-05-25T17:21:56.202Z", "dateUpdated": "2025-03-07T18:27:07.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5516 (GCVE-0-2019-5516)
Vulnerability from cvelistv5
Published
2019-04-15 16:57
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Vertex shader out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201904101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-201903001" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.0.3" }, { "status": "affected", "version": "14.x before 14.1.6" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.0.3" }, { "status": "affected", "version": "10.x before 10.1.6" } ] } ], "datePublic": "2019-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ], "problemTypes": [ { "descriptions": [ { "description": "Vertex shader out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-15T19:06:09", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5516", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201904101-SG" }, { "version_value": "6.5 before ESXi650-201903001" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.0.3" }, { "version_value": "14.x before 14.1.6" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.0.3" }, { "version_value": "10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Vertex shader out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5516", "datePublished": "2019-04-15T16:57:27", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22255 (GCVE-0-2024-22255)
Vulnerability from cvelistv5
Published
2024-03-05 17:58
Modified
2024-11-04 17:17
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | n/a | VMware ESXi |
Version: 8.0 < ESXi80U2sb-23305545 Version: 8.0 < ESXi80U1d-23299997 Version: 7.0 < ESXi70U3p-23307199 |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-22255", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T18:16:34.279529Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-04T17:17:14.669Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:33.725Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "VMware ESXi", "vendor": "n/a", "versions": [ { "lessThan": "ESXi80U2sb-23305545", "status": "affected", "version": "8.0 ", "versionType": "custom" }, { "lessThan": "ESXi80U1d-23299997", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3p-23307199", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Workstation", "vendor": "n/a", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "5.x" }, { "status": "affected", "version": "4.x" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eA malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.\u0026nbsp;\u0026nbsp;\u003c/span\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cbr\u003e" } ], "value": "VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller.\u00a0A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.\u00a0\u00a0\n\n\n\n\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-05T17:59:56.500Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information disclosure vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22255", "datePublished": "2024-03-05T17:58:35.987Z", "dateReserved": "2024-01-08T18:43:15.942Z", "dateUpdated": "2024-11-04T17:17:14.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20871 (GCVE-0-2023-20871)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-02-04 16:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- VMware Fusion Raw Disk local privilege escalation vulnerability
Summary
VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Fusion |
Version: VMware Fusion (13.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:21:32.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20871", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T16:50:23.292731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T16:52:33.588Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Fusion (13.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system." } ], "problemTypes": [ { "descriptions": [ { "description": "VMware Fusion Raw Disk local privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T00:00:00.000Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ] } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-20871", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-02-04T16:52:33.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-38811 (GCVE-0-2024-38811)
Vulnerability from cvelistv5
Published
2024-09-03 09:47
Modified
2024-09-05 15:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable. A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fusion", "vendor": "vmware", "versions": [ { "lessThan": "13.6", "status": "affected", "version": "13.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38811", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T03:55:54.392776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-05T15:36:52.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.6", "status": "affected", "version": "13.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable.\u0026nbsp;\u003c/span\u003eA malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable.\u00a0A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T09:47:28.120Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24939" } ], "source": { "discovery": "UNKNOWN" }, "title": "Code-execution vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-38811", "datePublished": "2024-09-03T09:47:28.120Z", "dateReserved": "2024-06-19T22:31:57.187Z", "dateUpdated": "2024-09-05T15:36:52.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1406 (GCVE-0-2013-1406)
Vulnerability from cvelistv5
Published
2013-02-11 22:00
Modified
2024-08-06 14:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:17164", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:17164", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0002.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-1406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:17164", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2013-0002.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2013-0002.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-1406", "datePublished": "2013-02-11T22:00:00", "dateReserved": "2013-01-19T00:00:00", "dateUpdated": "2024-08-06T14:57:05.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4941 (GCVE-0-2017-4941)
Vulnerability from cvelistv5
Published
2017-12-20 15:00
Modified
2024-09-16 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Stack overflow via authenticated VNC session
Summary
VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "name": "1040025", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040025" }, { "name": "1040024", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.0 before ESXi600-201711101-SG" }, { "status": "affected", "version": "5.5 ESXi550-201709101-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x before 12.5.8" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x before 8.5.9" } ] } ], "datePublic": "2017-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\u0027s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack overflow via authenticated VNC session", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-21T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "name": "1040025", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040025" }, { "name": "1040024", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-12-19T00:00:00", "ID": "CVE-2017-4941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.0 before ESXi600-201711101-SG" }, { "version_value": "5.5 ESXi550-201709101-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "12.x before 12.5.8" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "8.x before 8.5.9" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\u0027s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack overflow via authenticated VNC session" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "name": "1040025", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040025" }, { "name": "1040024", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040024" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4941", "datePublished": "2017-12-20T15:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-16T17:58:23.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6973 (GCVE-0-2018-6973)
Vulnerability from cvelistv5
Published
2018-08-15 12:00
Modified
2024-09-17 02:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 14.x before 14.1.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041491", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041491" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0022.html" }, { "name": "105094", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105094" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.3" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.3" } ] } ], "datePublic": "2018-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-16T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1041491", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041491" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0022.html" }, { "name": "105094", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105094" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-08-14T00:00:00", "ID": "CVE-2018-6973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "14.x before 14.1.3" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.3" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "1041491", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041491" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0022.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0022.html" }, { "name": "105094", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105094" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6973", "datePublished": "2018-08-15T12:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-17T02:41:38.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3980 (GCVE-0-2020-3980)
Vulnerability from cvelistv5
Published
2020-09-16 16:13
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation vulnerability
Summary
VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Fusion |
Version: VMware Fusion (11.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Fusion (11.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-16T16:13:40", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3980", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Fusion", "version": { "version_data": [ { "version_value": "VMware Fusion (11.x)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3980", "datePublished": "2020-09-16T16:13:40", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-5753 (GCVE-0-2017-5753)
Vulnerability from cvelistv5
Published
2018-01-04 13:00
Modified
2024-09-16 22:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Most Modern Operating Systems |
Version: All |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://spectreattack.com/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Most Modern Operating Systems", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T17:48:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_MISC" ], "url": "https://spectreattack.com/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-5753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Most Modern Operating Systems", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3580-1/" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX231399" }, { "name": "https://spectreattack.com/", "refsource": "MISC", "url": "https://spectreattack.com/" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-1/" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685359", "refsource": "CONFIRM", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5753", "datePublished": "2018-01-04T13:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T22:24:53.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3966 (GCVE-0-2020-3966)
Vulnerability from cvelistv5
Published
2020-06-25 14:45
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap-overflow due to race condition.
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-783/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-overflow due to race condition.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-30T15:06:02", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-783/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-overflow due to race condition." } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-783/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-783/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3966", "datePublished": "2020-06-25T14:45:34", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4933 (GCVE-0-2017-4933)
Vulnerability from cvelistv5
Published
2017-12-20 15:00
Modified
2024-09-16 23:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap overflow via authenticated VNC session
Summary
VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "name": "1040025", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040025" }, { "name": "1040024", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 before ESXi650-201710401-BG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x before 12.5.8" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x before 8.5.9" } ] } ], "datePublic": "2017-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\u0027s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow via authenticated VNC session", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-21T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "name": "1040025", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040025" }, { "name": "1040024", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-12-19T00:00:00", "ID": "CVE-2017-4933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 before ESXi650-201710401-BG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "12.x before 12.5.8" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "8.x before 8.5.9" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\u0027s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap overflow via authenticated VNC session" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "name": "1040025", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040025" }, { "name": "1040024", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040024" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4933", "datePublished": "2017-12-20T15:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-16T23:51:11.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5519 (GCVE-0-2019-5519)
Vulnerability from cvelistv5
Published
2019-04-01 20:39
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Time-of-check Time-of-use (TOCTOU) vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi, Workstation, Fusion |
Version: ESXi 6.7 before ESXi670-201903001 Version: ESXi 6.5 before ESXi650-201903001 Version: ESXi 6.0 before ESXi600-201903001 Version: Workstation 15.x before 15.0.4 Version: Workstation 14.x before 14.1.7 Version: Fusion 11.x before 11.0.3 Version: Fusion 10.x before 10.1.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107535", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107535" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-420/" }, { "name": "108443", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108443" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "ESXi 6.7 before ESXi670-201903001" }, { "status": "affected", "version": "ESXi 6.5 before ESXi650-201903001" }, { "status": "affected", "version": "ESXi 6.0 before ESXi600-201903001" }, { "status": "affected", "version": "Workstation 15.x before 15.0.4" }, { "status": "affected", "version": "Workstation 14.x before 14.1.7" }, { "status": "affected", "version": "Fusion 11.x before 11.0.3" }, { "status": "affected", "version": "Fusion 10.x before 10.1.6" } ] } ], "datePublic": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Time-of-check Time-of-use (TOCTOU) vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-24T11:06:04", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "107535", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107535" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-420/" }, { "name": "108443", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108443" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5519", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, Fusion", "version": { "version_data": [ { "version_value": "ESXi 6.7 before ESXi670-201903001" }, { "version_value": "ESXi 6.5 before ESXi650-201903001" }, { "version_value": "ESXi 6.0 before ESXi600-201903001" }, { "version_value": "Workstation 15.x before 15.0.4" }, { "version_value": "Workstation 14.x before 14.1.7" }, { "version_value": "Fusion 11.x before 11.0.3" }, { "version_value": "Fusion 10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Time-of-check Time-of-use (TOCTOU) vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "107535", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107535" }, { "name": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-420/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-420/" }, { "name": "108443", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108443" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5519", "datePublished": "2019-04-01T20:39:47", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-1208 (GCVE-0-2014-1208)
Vulnerability from cvelistv5
Published
2014-01-17 19:00
Modified
2024-08-06 09:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:34:41.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "56499", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56499" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0001.html" }, { "name": "64994", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64994" }, { "name": "1029644", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029644" }, { "name": "102197", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102197" }, { "name": "1029643", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029643" }, { "name": "vmware-esx-cve20141208-dos(90558)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90558" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "56499", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56499" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0001.html" }, { "name": "64994", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64994" }, { "name": "1029644", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029644" }, { "name": "102197", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102197" }, { "name": "1029643", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029643" }, { "name": "vmware-esx-cve20141208-dos(90558)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90558" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1208", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "56499", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56499" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0001.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0001.html" }, { "name": "64994", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64994" }, { "name": "1029644", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029644" }, { "name": "102197", "refsource": "OSVDB", "url": "http://osvdb.org/102197" }, { "name": "1029643", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029643" }, { "name": "vmware-esx-cve20141208-dos(90558)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90558" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1208", "datePublished": "2014-01-17T19:00:00", "dateReserved": "2014-01-07T00:00:00", "dateUpdated": "2024-08-06T09:34:41.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6974 (GCVE-0-2018-6974)
Vulnerability from cvelistv5
Published
2018-10-16 20:00
Modified
2024-09-16 19:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105660", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105660" }, { "name": "1041876", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041876" }, { "name": "1041875", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041875" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201810101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-201808401-BG" }, { "status": "affected", "version": "6.0 before ESXi600-201808401-BG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.3" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.3" } ] } ], "datePublic": "2018-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "105660", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105660" }, { "name": "1041876", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041876" }, { "name": "1041875", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041875" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-10-16T00:00:00", "ID": "CVE-2018-6974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201810101-SG" }, { "version_value": "6.5 before ESXi650-201808401-BG" }, { "version_value": "6.0 before ESXi600-201808401-BG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "14.x before 14.1.3" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.3" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "105660", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105660" }, { "name": "1041876", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041876" }, { "name": "1041875", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041875" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6974", "datePublished": "2018-10-16T20:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T19:46:18.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3958 (GCVE-0-2020-3958)
Vulnerability from cvelistv5
Published
2020-05-29 19:42
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.5.2) and VMware Fusion (11.x before 11.5.2) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine's vmx process leading to a denial of service condition.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "VMware Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.5.2) and VMware Fusion (11.x before 11.5.2) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine\u0027s vmx process leading to a denial of service condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-01T14:06:05", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3958", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "VMware Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "VMware Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.5.2) and VMware Fusion (11.x before 11.5.2) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine\u0027s vmx process leading to a denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3958", "datePublished": "2020-05-29T19:42:41", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2339 (GCVE-0-2015-2339)
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:15.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75092" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75092" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032529", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75092" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032530" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2339", "datePublished": "2015-06-13T14:00:00", "dateReserved": "2015-03-18T00:00:00", "dateUpdated": "2024-08-06T05:10:15.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4902 (GCVE-0-2017-4902)
Vulnerability from cvelistv5
Published
2017-06-07 18:00
Modified
2024-08-05 14:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap Buffer Overflow
Summary
VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 6.5 without patch ESXi650-201703410-SG Version: 5.5 without patch ESXi550-201703401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "97163", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97163" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 without patch ESXi650-201703410-SG" }, { "status": "affected", "version": "5.5 without patch ESXi550-201703401-SG" } ] }, { "product": "Workstation Pro / Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x prior to 12.5.5" } ] }, { "product": "Fusion Pro / Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x prior to 8.5.6" } ] } ], "datePublic": "2017-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "97163", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97163" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2017-4902", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 without patch ESXi650-201703410-SG" }, { "version_value": "5.5 without patch ESXi550-201703401-SG" } ] } }, { "product_name": "Workstation Pro / Player", "version": { "version_data": [ { "version_value": "12.x prior to 12.5.5" } ] } }, { "product_name": "Fusion Pro / Fusion", "version": { "version_data": [ { "version_value": "8.x prior to 8.5.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038148" }, { "name": "97163", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97163" }, { "name": "1038149", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038149" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4902", "datePublished": "2017-06-07T18:00:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-08-05T14:39:41.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5330 (GCVE-0-2016-5330)
Vulnerability from cvelistv5
Published
2016-08-08 01:00
Modified
2024-08-06 01:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:00:58.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036544", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036544" }, { "name": "1036619", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036619" }, { "name": "92323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92323" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0010.html" }, { "name": "20160805 DLL side loading vulnerability in VMware Host Guest Client Redirector", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/539131/100/0/threaded" }, { "name": "1036545", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036545" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1036544", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036544" }, { "name": "1036619", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036619" }, { "name": "92323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92323" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0010.html" }, { "name": "20160805 DLL side loading vulnerability in VMware Host Guest Client Redirector", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/539131/100/0/threaded" }, { "name": "1036545", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036545" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036544", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036544" }, { "name": "1036619", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036619" }, { "name": "92323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92323" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2016-0010.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2016-0010.html" }, { "name": "20160805 DLL side loading vulnerability in VMware Host Guest Client Redirector", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/539131/100/0/threaded" }, { "name": "1036545", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036545" }, { "name": "https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html", "refsource": "MISC", "url": "https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html" }, { "name": "http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-5330", "datePublished": "2016-08-08T01:00:00", "dateReserved": "2016-06-07T00:00:00", "dateUpdated": "2024-08-06T01:00:58.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2341 (GCVE-0-2015-2341)
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.6, and VMware Fusion 6.x before 6.0.6 and 7.x before 7.0.1 allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS via a crafted RPC command.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:16.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "75094", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75094" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.6, and VMware Fusion 6.x before 6.0.6 and 7.x before 7.0.1 allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS via a crafted RPC command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "75094", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75094" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2341", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.6, and VMware Fusion 6.x before 6.0.6 and 7.x before 7.0.1 allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS via a crafted RPC command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "75094", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75094" }, { "name": "1032530", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032530" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2341", "datePublished": "2015-06-13T14:00:00", "dateReserved": "2015-03-18T00:00:00", "dateUpdated": "2024-08-06T05:10:16.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6966 (GCVE-0-2018-6966)
Vulnerability from cvelistv5
Published
2018-07-09 20:00
Modified
2024-09-16 23:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6967.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi, Workstation, and Fusion |
Version: VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104709", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041208" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2)" } ] } ], "datePublic": "2018-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6967." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-12T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "104709", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041208" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-06-28T00:00:00", "ID": "CVE-2018-6966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, and Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6967." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "104709", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104709" }, { "name": "1041208", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041208" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6966", "datePublished": "2018-07-09T20:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T23:22:13.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1138 (GCVE-0-2010-1138)
Vulnerability from cvelistv5
Published
2010-04-12 18:00
Modified
2024-08-07 01:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:05.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39203" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "1023836", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023836" }, { "name": "39395", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39395" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "39215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39215" }, { "name": "63607", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/63607" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39203", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39203" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "1023836", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023836" }, { "name": "39395", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39395" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "39215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39215" }, { "name": "63607", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/63607" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39203", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39203" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "1023836", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023836" }, { "name": "39395", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39395" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "39215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39215" }, { "name": "63607", "refsource": "OSVDB", "url": "http://osvdb.org/63607" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1138", "datePublished": "2010-04-12T18:00:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:05.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41237 (GCVE-0-2025-41237)
Vulnerability from cvelistv5
Published
2025-07-15 18:34
Modified
2025-07-16 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
VMware ESXi, Workstation, and Fusion contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | Cloud Foundation |
Version: 9.0.0.0, 5.x, 4.5.x |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41237", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-16T03:55:59.690Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Cloud Foundation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "9.0.0.0, 5.x, 4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "vSphere Foundation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "9.0.0.0" } ] }, { "defaultStatus": "unaffected", "product": "ESXi", "vendor": "VMware", "versions": [ { "lessThan": "ESXi80U3f-24784735", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi80U2e-24789317", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3w-24784741", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Workstation", "vendor": "VMware", "versions": [ { "lessThan": "17.6.4", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.6.4", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Platform", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.x, 3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Infrastructure", "vendor": "VMware", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] } ], "datePublic": "2025-07-15T03:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi,\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;Workstation, and Fusion\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware ESXi,\u00a0Workstation, and Fusion\u00a0contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-15T18:34:21.083Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877" } ], "source": { "discovery": "UNKNOWN" }, "title": "VMCI integer-underflow vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2025-41237", "datePublished": "2025-07-15T18:34:21.083Z", "dateReserved": "2025-04-16T09:30:17.798Z", "dateUpdated": "2025-07-16T03:55:59.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6982 (GCVE-0-2018-6982)
Vulnerability from cvelistv5
Published
2018-12-04 14:00
Modified
2024-08-05 06:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- uninitialized stack memory
Summary
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware ESXi |
Version: VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1042055", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042055" }, { "name": "105882", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105882" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest." } ], "problemTypes": [ { "descriptions": [ { "description": "uninitialized stack memory", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-05T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1042055", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042055" }, { "name": "105882", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105882" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2018-6982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "VMware ESXi 6.7 without ESXi670-201811401-BG, VMware ESXi 6.5 without ESXi650-201811301-BG" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "uninitialized stack memory" } ] } ] }, "references": { "reference_data": [ { "name": "1042055", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042055" }, { "name": "105882", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105882" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6982", "datePublished": "2018-12-04T14:00:00", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-08-05T06:17:17.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3995 (GCVE-0-2020-3995)
Vulnerability from cvelistv5
Published
2020-10-20 16:14
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory leak vulnerability
Summary
In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, Workstation, Fusion |
Version: VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0)" } ] } ], "descriptions": [ { "lang": "en", "value": "In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T16:14:34", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3995", "datePublished": "2020-10-20T16:14:34", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3948 (GCVE-0-2020-3948)
Vulnerability from cvelistv5
Published
2020-03-16 17:17
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Local privilege escalation vulnerability
Summary
Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 15.x before 15.5.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM." } ], "problemTypes": [ { "descriptions": [ { "description": "Local privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-16T17:17:39", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3948", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3948", "datePublished": "2020-03-16T17:17:39", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4925 (GCVE-0-2017-4925)
Vulnerability from cvelistv5
Published
2017-09-15 13:00
Modified
2024-09-17 03:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NULL pointer dereference vulnerability
Summary
VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039368", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039368" }, { "name": "100842", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100842" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "name": "1039367", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039367" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 without patch ESXi650-201707101-SG" }, { "status": "affected", "version": "6.0 without patch ESXi600-201706101-SG" }, { "status": "affected", "version": "5.5 without patch ESXi550-201709101-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x before 12.5.3" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x before 8.5.4" } ] } ], "datePublic": "2017-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-16T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1039368", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039368" }, { "name": "100842", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100842" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "name": "1039367", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039367" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-09-14T00:00:00", "ID": "CVE-2017-4925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 without patch ESXi650-201707101-SG" }, { "version_value": "6.0 without patch ESXi600-201706101-SG" }, { "version_value": "5.5 without patch ESXi550-201709101-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "12.x before 12.5.3" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "8.x before 8.5.4" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "1039368", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039368" }, { "name": "100842", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100842" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "name": "1039367", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039367" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4925", "datePublished": "2017-09-15T13:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T03:03:34.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4901 (GCVE-0-2017-4901)
Vulnerability from cvelistv5
Published
2017-06-08 13:00
Modified
2024-08-05 14:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote code execution
Summary
The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | VMware | Workstation Pro/Player |
Version: 12.x prior to 12.5.4 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0005.html" }, { "name": "1038025", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038025" }, { "name": "96881", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation Pro/Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x prior to 12.5.4" } ] }, { "product": "Fusion Pro / Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x prior to 8.5.5." } ] } ], "datePublic": "2017-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0005.html" }, { "name": "1038025", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038025" }, { "name": "96881", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2017-4901", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation Pro/Player", "version": { "version_data": [ { "version_value": "12.x prior to 12.5.4" } ] } }, { "product_name": "Fusion Pro / Fusion", "version": { "version_data": [ { "version_value": "8.x prior to 8.5.5." } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0005.html" }, { "name": "1038025", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038025" }, { "name": "96881", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96881" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4901", "datePublished": "2017-06-08T13:00:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-08-05T14:39:41.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3957 (GCVE-0-2020-3957)
Vulnerability from cvelistv5
Published
2020-05-29 19:37
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Local privilege escalation vulnerability
Summary
VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware Fusion |
Version: 11.x before 11.5.5 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.5" } ] }, { "product": "VMware Remote Console for Mac", "vendor": "VMware", "versions": [ { "status": "affected", "version": "V11.x and prior" } ] }, { "product": "VMware Horizon Client for Mac", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed." } ], "problemTypes": [ { "descriptions": [ { "description": "Local privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-29T19:37:58", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3957", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.5" } ] } }, { "product_name": "VMware Remote Console for Mac", "version": { "version_data": [ { "version_value": "V11.x and prior" } ] } }, { "product_name": "VMware Horizon Client for Mac", "version": { "version_data": [ { "version_value": "5.x and prior" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Local privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3957", "datePublished": "2020-05-29T19:37:58", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22267 (GCVE-0-2024-22267)
Vulnerability from cvelistv5
Published
2024-05-14 12:58
Modified
2025-03-14 14:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | NA | VMware Workstation |
Version: 17.x < 17.5.2 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vmware:vmware_workstation:17.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vmware_workstation", "vendor": "vmware", "versions": [ { "lessThan": "17.5.2", "status": "affected", "version": "17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:vmware:fusion:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fusion", "vendor": "vmware", "versions": [ { "lessThan": "13.5.2", "status": "affected", "version": "13.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22267", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-17T04:00:38.016096Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-14T14:56:10.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "VMware Workstation", "vendor": "NA", "versions": [ { "lessThan": "17.5.2", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "N/A", "versions": [ { "lessThan": "13.5.2", "status": "affected", "version": "13.x", "versionType": "custom" } ] } ], "datePublic": "2024-05-14T04:40:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-14T12:58:31.261Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22267", "datePublished": "2024-05-14T12:58:31.261Z", "dateReserved": "2024-01-08T18:43:17.078Z", "dateUpdated": "2025-03-14T14:56:10.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22269 (GCVE-0-2024-22269)
Vulnerability from cvelistv5
Published
2024-05-14 12:59
Modified
2024-08-01 22:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information disclosure vulnerability
Summary
VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | N/A | VMware Workstation |
Version: 17.x < 17.5.2 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "vmware_workstation", "vendor": "vmware", "versions": [ { "status": "affected", "version": "17.0.0" } ] }, { "cpes": [ "cpe:2.3:a:vmware:fusion:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fusion", "vendor": "vmware", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22269", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-14T14:11:37.404757Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:42.552Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:33.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "VMware Workstation", "vendor": "N/A", "versions": [ { "lessThan": "17.5.2", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "N/A", "versions": [ { "lessThan": "13.5.2", "status": "affected", "version": "13.x", "versionType": "custom" } ] } ], "datePublic": "2024-05-14T04:50:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device.\u00a0A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-14T12:59:28.869Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22269", "datePublished": "2024-05-14T12:59:28.869Z", "dateReserved": "2024-01-08T18:43:17.079Z", "dateUpdated": "2024-08-01T22:43:33.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3982 (GCVE-0-2020-3982)
Vulnerability from cvelistv5
Published
2020-10-20 16:09
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's vmx process or corrupt hypervisor's memory heap.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, Workstation, Fusion |
Version: VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine\u0027s vmx process or corrupt hypervisor\u0027s memory heap." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T16:09:04", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine\u0027s vmx process or corrupt hypervisor\u0027s memory heap." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3982", "datePublished": "2020-10-20T16:09:04", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5514 (GCVE-0-2019-5514)
Vulnerability from cvelistv5
Published
2019-04-01 20:21
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Unauthenticated APIs Security vulnerability
Summary
VMware VMware Fusion (11.x before 11.0.3) contains a security vulnerability due to certain unauthenticated APIs accessible through a web socket. An attacker may exploit this issue by tricking the host user to execute a JavaScript to perform unauthorized functions on the guest machine where VMware Tools is installed. This may further be exploited to execute commands on the guest machines.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware Fusion |
Version: 11.x before 11.0.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:52.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "107637", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107637" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.0.3" } ] } ], "datePublic": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware VMware Fusion (11.x before 11.0.3) contains a security vulnerability due to certain unauthenticated APIs accessible through a web socket. An attacker may exploit this issue by tricking the host user to execute a JavaScript to perform unauthorized functions on the guest machine where VMware Tools is installed. This may further be exploited to execute commands on the guest machines." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthenticated APIs Security vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-01T20:21:11", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "107637", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107637" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.0.3" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware VMware Fusion (11.x before 11.0.3) contains a security vulnerability due to certain unauthenticated APIs accessible through a web socket. An attacker may exploit this issue by tricking the host user to execute a JavaScript to perform unauthorized functions on the guest machine where VMware Tools is installed. This may further be exploited to execute commands on the guest machines." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthenticated APIs Security vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "107637", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107637" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5514", "datePublished": "2019-04-01T20:21:11", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:52.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4938 (GCVE-0-2017-4938)
Vulnerability from cvelistv5
Published
2017-11-17 14:00
Modified
2024-09-17 03:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NULL pointer dereference vulnerability
Summary
VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 12.x before 12.5.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:43.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "name": "1039835", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039835" }, { "name": "101887", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101887" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x before 12.5.8" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x before 8.5.9" } ] } ], "datePublic": "2017-11-16T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "name": "1039835", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039835" }, { "name": "101887", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101887" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-11-16T00:00:00", "ID": "CVE-2017-4938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "12.x before 12.5.8" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "8.x before 8.5.9" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "name": "1039835", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039835" }, { "name": "101887", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101887" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4938", "datePublished": "2017-11-17T14:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T03:28:55.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22226 (GCVE-0-2025-22226)
Vulnerability from cvelistv5
Published
2025-03-04 11:56
Modified
2025-07-30 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information disclosure vulnerability
Summary
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | n/a | ESXi |
Version: 8.0 < ESXi80U3d-24585383 Version: 8.0 < ESXi80U2d-24585300 Version: 7.0 < ESXi70U3s-24585291 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22226", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-05T04:55:25.321408Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-03-04", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22226" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:18.577Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-03-04T00:00:00+00:00", "value": "CVE-2025-22226 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESXi", "vendor": "n/a", "versions": [ { "lessThan": "ESXi80U3d-24585383", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi80U2d-24585300", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3s-24585291", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "VMware Workstation", "vendor": "n/a", "versions": [ { "lessThan": "17.6.3", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.6.3", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "5.x, 4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "VMware Telco Cloud Platform", "vendor": "n/a", "versions": [ { "status": "affected", "version": "5.x, 4.x, 3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "product": "VMware Telco Cloud Infrastructure", "vendor": "n/a", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] } ], "datePublic": "2025-03-04T11:50:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, and Fusion contain\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;an information disclosure \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003evulnerability \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003edue to an out-of-bounds read in HGFS.\u0026nbsp;\u003c/span\u003eA malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware ESXi, Workstation, and Fusion contain\u00a0an information disclosure vulnerability due to an out-of-bounds read in HGFS.\u00a0A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T11:56:57.541Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2025-22226", "datePublished": "2025-03-04T11:56:57.541Z", "dateReserved": "2025-01-02T04:29:59.190Z", "dateUpdated": "2025-07-30T01:36:18.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3288 (GCVE-0-2012-3288)
Vulnerability from cvelistv5
Published
2012-06-14 20:00
Modified
2024-08-06 19:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:57:50.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html" }, { "name": "oval:org.mitre.oval:def:17178", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html" }, { "name": "oval:org.mitre.oval:def:17178", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-3288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html" }, { "name": "oval:org.mitre.oval:def:17178", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-3288", "datePublished": "2012-06-14T20:00:00", "dateReserved": "2012-06-07T00:00:00", "dateUpdated": "2024-08-06T19:57:50.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22045 (GCVE-0-2021-22045)
Vulnerability from cvelistv5
Published
2022-01-04 21:39
Modified
2024-08-03 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap-based Buffer Overflow Vulnerability
Summary
VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, VMware Workstation and VMware Fusion |
Version: VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:30:24.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, VMware Workstation and VMware Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-06T14:06:30", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2021-22045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, VMware Workstation and VMware Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html" }, { "name": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-003/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2021-22045", "datePublished": "2022-01-04T21:39:03", "dateReserved": "2021-01-04T00:00:00", "dateUpdated": "2024-08-03T18:30:24.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5524 (GCVE-0-2019-5524)
Vulnerability from cvelistv5
Published
2019-04-02 14:08
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware Workstation (14.x before 14.1.6) and Fusion (10.x before 10.1.6) contain an out-of-bounds write vulnerability in the e1000 virtual network adapter. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | VMware Workstation, VMware Fusion |
Version: Workstation (14.x before 14.1.6) Version: Fusion (10.x before 10.1.6) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "107635", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107635" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware Workstation, VMware Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "Workstation (14.x before 14.1.6)" }, { "status": "affected", "version": "Fusion (10.x before 10.1.6)" } ] } ], "datePublic": "2019-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.6) and Fusion (10.x before 10.1.6) contain an out-of-bounds write vulnerability in the e1000 virtual network adapter. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-02T14:08:48", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "107635", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107635" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5524", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Workstation, VMware Fusion", "version": { "version_data": [ { "version_value": "Workstation (14.x before 14.1.6)" }, { "version_value": "Fusion (10.x before 10.1.6)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (14.x before 14.1.6) and Fusion (10.x before 10.1.6) contain an out-of-bounds write vulnerability in the e1000 virtual network adapter. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "name": "107635", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107635" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5524", "datePublished": "2019-04-02T14:08:48", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6963 (GCVE-0-2018-6963)
Vulnerability from cvelistv5
Published
2018-05-22 13:00
Modified
2024-09-16 16:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Multiple Denial-of-service vulnerabilities
Summary
VMware Workstation (14.x before 14.1.2) and Fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to NULL pointer dereference issues in the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-Service of their guest machine.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 14.x before 14.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104237", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104237" }, { "name": "1040957", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.2" } ] } ], "datePublic": "2018-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.2) and Fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to NULL pointer dereference issues in the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-Service of their guest machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Multiple Denial-of-service vulnerabilities", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-23T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "104237", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104237" }, { "name": "1040957", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-05-21T00:00:00", "ID": "CVE-2018-6963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "14.x before 14.1.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (14.x before 14.1.2) and Fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to NULL pointer dereference issues in the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-Service of their guest machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multiple Denial-of-service vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "name": "104237", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104237" }, { "name": "1040957", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040957" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6963", "datePublished": "2018-05-22T13:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T16:53:07.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3793 (GCVE-0-2014-3793)
Vulnerability from cvelistv5
Published
2014-05-31 10:00
Modified
2024-08-06 10:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:17.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html" }, { "name": "1030310", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030310" }, { "name": "1030311", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030311" }, { "name": "20140530 NEW VMSA-2014-0005 - VMware Workstation, Player, Fusion, and ESXi patches address a guest privilege escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532236/100/0/threaded" }, { "name": "58894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58894" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html" }, { "name": "1030310", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030310" }, { "name": "1030311", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030311" }, { "name": "20140530 NEW VMSA-2014-0005 - VMware Workstation, Player, Fusion, and ESXi patches address a guest privilege escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532236/100/0/threaded" }, { "name": "58894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58894" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0005.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0005.html" }, { "name": "http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html" }, { "name": "1030310", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030310" }, { "name": "1030311", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030311" }, { "name": "20140530 NEW VMSA-2014-0005 - VMware Workstation, Player, Fusion, and ESXi patches address a guest privilege escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532236/100/0/threaded" }, { "name": "58894", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58894" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3793", "datePublished": "2014-05-31T10:00:00", "dateReserved": "2014-05-20T00:00:00", "dateUpdated": "2024-08-06T10:57:17.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3962 (GCVE-0-2020-3962)
Vulnerability from cvelistv5
Published
2020-06-24 16:01
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-785/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.5" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-30T15:06:04", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-785/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3962", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.5" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.5" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-785/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-785/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3962", "datePublished": "2020-06-24T16:01:53", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31705 (GCVE-0-2022-31705)
Vulnerability from cvelistv5
Published
2022-12-14 00:00
Modified
2025-04-18 15:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Heap out-of-bounds write vulnerability
Summary
VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, VMware Workstation Pro / Player, VMware Fusion Pro / Fusion (Fusion), VMware Cloud Foundation |
Version: VMware ESXi (8.0 prior to ESXi80a-20842819, 7.0 prior to ESXi70U3si-20841705, VMware Workstation Pro / Player (16.x prior to 16.2.5), VMware Fusion Pro / Fusion (12.x prior to 12.2.5), VMware Cloud Foundation (4.x, 3.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:00.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0033.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-31705", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-18T14:59:46.004073Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-18T15:03:03.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "VMware ESXi, VMware Workstation Pro / Player, VMware Fusion Pro / Fusion (Fusion), VMware Cloud Foundation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (8.0 prior to ESXi80a-20842819, 7.0 prior to ESXi70U3si-20841705, VMware Workstation Pro / Player (16.x prior to 16.2.5), VMware Fusion Pro / Fusion (12.x prior to 12.2.5), VMware Cloud Foundation (4.x, 3.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-14T00:00:00.000Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2022-0033.html" } ] } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2022-31705", "datePublished": "2022-12-14T00:00:00.000Z", "dateReserved": "2022-05-25T00:00:00.000Z", "dateUpdated": "2025-04-18T15:03:03.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4950 (GCVE-0-2017-4950)
Vulnerability from cvelistv5
Published
2018-01-11 14:00
Modified
2024-09-17 02:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Integer-overflow vulnerability
Summary
VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation Pro / Player |
Version: 14.x before 14.1.1 Version: 12.x before 12.5.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:47:44.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040161", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040161" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" }, { "name": "102490", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102490" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation Pro / Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.1" }, { "status": "affected", "version": "12.x before 12.5.9" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.1" }, { "status": "affected", "version": "8.x before 8.5.10" } ] } ], "datePublic": "2017-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer-overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-12T10:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "1040161", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040161" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" }, { "name": "102490", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102490" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2017-01-10T00:00:00", "ID": "CVE-2017-4950", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation Pro / Player", "version": { "version_data": [ { "version_value": "14.x before 14.1.1" }, { "version_value": "12.x before 12.5.9" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.1" }, { "version_value": "8.x before 8.5.10" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer-overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "1040161", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040161" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" }, { "name": "102490", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102490" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4950", "datePublished": "2018-01-11T14:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T02:47:03.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41239 (GCVE-0-2025-41239)
Vulnerability from cvelistv5
Published
2025-07-15 18:35
Modified
2025-07-15 18:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-908 - Use of Uninitialized Resource
Summary
VMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets. A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 8.0 < ESXi80U3f-24784735 Version: 8.0 < ESXi80U2e-24789317 Version: 7.0 < ESXi70U3w-24784741 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41239", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-15T18:51:16.482481Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-15T18:51:58.342Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESXi", "vendor": "VMware", "versions": [ { "lessThan": "ESXi80U3f-24784735", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi80U2e-24789317", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3w-24784741", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Cloud Foundation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.5.x" } ] }, { "defaultStatus": "unaffected", "product": "Workstation", "vendor": "VMware", "versions": [ { "lessThan": "17.6.4", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.6.4", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Platform", "vendor": "VMware", "versions": [ { "status": "affected", "version": "5.x, 4.x, 3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "product": "Telco Cloud Infrastructure", "vendor": "VMware", "versions": [ { "status": "affected", "version": "3.x, 2.x" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Tools", "vendor": "VMware", "versions": [ { "lessThan": "13.0.1.0", "status": "affected", "version": "13.x.x", "versionType": "custom" }, { "lessThan": "12.5.3", "status": "affected", "version": "12.x.x, 11.x.x,", "versionType": "custom" } ] } ], "datePublic": "2025-07-15T03:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "VMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets.\u00a0A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-15T18:35:03.747Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877" } ], "source": { "discovery": "UNKNOWN" }, "title": "vSockets information-disclosure vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2025-41239", "datePublished": "2025-07-15T18:35:03.747Z", "dateReserved": "2025-04-16T09:30:17.798Z", "dateUpdated": "2025-07-15T18:51:58.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2267 (GCVE-0-2009-2267)
Vulnerability from cvelistv5
Published
2009-11-02 15:00
Modified
2024-08-07 05:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2009-3062", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3062" }, { "name": "[security-announce] 20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" }, { "name": "1023082", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023082" }, { "name": "36841", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36841" }, { "name": "oval:org.mitre.oval:def:8473", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" }, { "name": "20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507523/100/0/threaded" }, { "name": "20091027 Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507539/100/0/threaded" }, { "name": "1023083", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023083" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" }, { "name": "37172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37172" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2009-3062", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3062" }, { "name": "[security-announce] 20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" }, { "name": "1023082", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023082" }, { "name": "36841", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36841" }, { "name": "oval:org.mitre.oval:def:8473", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" }, { "name": "20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507523/100/0/threaded" }, { "name": "20091027 Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507539/100/0/threaded" }, { "name": "1023083", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023083" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" }, { "name": "37172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37172" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2267", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ADV-2009-3062", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3062" }, { "name": "[security-announce] 20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" }, { "name": "1023082", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023082" }, { "name": "36841", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36841" }, { "name": "oval:org.mitre.oval:def:8473", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" }, { "name": "20091027 VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507523/100/0/threaded" }, { "name": "20091027 Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507539/100/0/threaded" }, { "name": "1023083", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023083" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0015.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" }, { "name": "37172", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37172" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2267", "datePublished": "2009-11-02T15:00:00", "dateReserved": "2009-07-01T00:00:00", "dateUpdated": "2024-08-07T05:44:55.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3963 (GCVE-0-2020-3963)
Vulnerability from cvelistv5
Published
2020-06-25 14:50
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202006401-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202006401-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.2" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-17T20:06:11", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202006401-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.2" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.2" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "name": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3963", "datePublished": "2020-06-25T14:50:52", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5542 (GCVE-0-2019-5542)
Vulnerability from cvelistv5
Published
2019-11-20 15:11
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
VMware | Workstation and Fusion |
Version: Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:50.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation and Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-20T15:11:57", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5542", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation and Fusion", "version": { "version_data": [ { "version_value": "Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1)" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5542", "datePublished": "2019-11-20T15:11:57", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:50.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34045 (GCVE-0-2023-34045)
Vulnerability from cvelistv5
Published
2023-10-20 09:00
Modified
2025-03-07 18:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during
installation for the first time (the user needs to drag or copy the
application to a folder from the '.dmg' volume) or when installing an
upgrade. A malicious actor with local non-administrative user privileges may
exploit this vulnerability to escalate privileges to root on the system
where Fusion is installed or being installed for the first time.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:52.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34045", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-06T15:26:55.835802Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-07T18:25:05.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "Fusion", "vendor": "VMware", "versions": [ { "lessThan": "13.5", "status": "affected", "version": "13.x", "versionType": "13.5" } ] } ], "datePublic": "2023-10-19T18:29:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "VMware Fusion(13.x prior to 13.5)\u0026nbsp;contains a local privilege escalation vulnerability that occurs during \ninstallation for the first time (the user needs to drag or copy the \napplication to a folder from the \u0027.dmg\u0027 volume) or when installing an \nupgrade.\u0026nbsp;A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time." } ], "value": "VMware Fusion(13.x prior to 13.5)\u00a0contains a local privilege escalation vulnerability that occurs during \ninstallation for the first time (the user needs to drag or copy the \napplication to a folder from the \u0027.dmg\u0027 volume) or when installing an \nupgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T09:00:30.352Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "VMware Fusion installer local privilege escalation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-34045", "datePublished": "2023-10-20T09:00:30.352Z", "dateReserved": "2023-05-25T17:21:56.202Z", "dateUpdated": "2025-03-07T18:25:05.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-3519 (GCVE-0-2013-3519)
Vulnerability from cvelistv5
Published
2013-12-04 15:00
Modified
2024-08-06 16:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-03T00:00:00", "descriptions": [ { "lang": "en", "value": "lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-04T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3519", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2013-0014.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2013-0014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3519", "datePublished": "2013-12-04T15:00:00", "dateReserved": "2013-05-08T00:00:00", "dateUpdated": "2024-08-06T16:14:56.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5527 (GCVE-0-2019-5527)
Vulnerability from cvelistv5
Published
2019-10-10 16:28
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use-after-free vulnerability
Summary
ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | ESXi, Workstation, Fusion, VMRC and Horizon Client |
Version: ESXi 6.7. 6.5, 6.0, Workstation 15.x, Fusion 11.x, VMRC 10.x and Horizon Client 5.x and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:50.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi, Workstation, Fusion, VMRC and Horizon Client", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ESXi 6.7. 6.5, 6.0, Workstation 15.x, Fusion 11.x, VMRC 10.x and Horizon Client 5.x and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-10T16:28:46", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi, Workstation, Fusion, VMRC and Horizon Client", "version": { "version_data": [ { "version_value": "ESXi 6.7. 6.5, 6.0, Workstation 15.x, Fusion 11.x, VMRC 10.x and Horizon Client 5.x and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5527", "datePublished": "2019-10-10T16:28:46", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:50.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3950 (GCVE-0-2020-3950)
Vulnerability from cvelistv5
Published
2020-03-17 18:41
Modified
2025-07-30 01:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation vulnerability
Summary
VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac |
Version: VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-3950", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T18:00:39.737303Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3950" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:45:45.741Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2020-3950 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "VMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-03T04:06:04.000Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3950", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware Fusion, VMware Remote Console for Mac and Horizon Client for Mac", "version": { "version_data": [ { "version_value": "VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html" }, { "name": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html" }, { "name": "http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3950", "datePublished": "2020-03-17T18:41:52.000Z", "dateReserved": "2019-12-30T00:00:00.000Z", "dateUpdated": "2025-07-30T01:45:45.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4903 (GCVE-0-2017-4903)
Vulnerability from cvelistv5
Published
2017-06-07 18:00
Modified
2024-08-05 14:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Uninitialized Stack Memory Usage
Summary
VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 6.5 without patch ESXi650-201703410-SG Version: 6.0 U3 without patch ESXi600-201703401-SG Version: 6.0 U2 without patch ESXi600-201703403-SG Version: 6.0 U1 without patch ESXi600-201703402-SG Version: 5.5 without patch ESXi550-201703401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97160", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97160" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 without patch ESXi650-201703410-SG" }, { "status": "affected", "version": "6.0 U3 without patch ESXi600-201703401-SG" }, { "status": "affected", "version": "6.0 U2 without patch ESXi600-201703403-SG" }, { "status": "affected", "version": "6.0 U1 without patch ESXi600-201703402-SG" }, { "status": "affected", "version": "5.5 without patch ESXi550-201703401-SG" } ] }, { "product": "Workstation Pro / Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x prior to 12.5.5" } ] }, { "product": "Fusion Pro / Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x prior to 8.5.6" } ] } ], "datePublic": "2017-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized Stack Memory Usage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "97160", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97160" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2017-4903", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 without patch ESXi650-201703410-SG" }, { "version_value": "6.0 U3 without patch ESXi600-201703401-SG" }, { "version_value": "6.0 U2 without patch ESXi600-201703403-SG" }, { "version_value": "6.0 U1 without patch ESXi600-201703402-SG" }, { "version_value": "5.5 without patch ESXi550-201703401-SG" } ] } }, { "product_name": "Workstation Pro / Player", "version": { "version_data": [ { "version_value": "12.x prior to 12.5.5" } ] } }, { "product_name": "Fusion Pro / Fusion", "version": { "version_data": [ { "version_value": "8.x prior to 8.5.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized Stack Memory Usage" } ] } ] }, "references": { "reference_data": [ { "name": "97160", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97160" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038149" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4903", "datePublished": "2017-06-07T18:00:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-08-05T14:39:41.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22273 (GCVE-0-2024-22273)
Vulnerability from cvelistv5
Published
2024-05-21 17:29
Modified
2025-03-26 16:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read/write vulnerability
Summary
The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | n/a | VMware ESXi |
Version: 8.0 < ESXi80U2sb-23305545 Version: 7.0 < ESXi70U3sq-23794019 |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vmware:fusion:13.x:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "fusion", "vendor": "vmware", "versions": [ { "status": "affected", "version": "13.x" } ] }, { "cpes": [ "cpe:2.3:a:vmware:workstation:17.x:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "workstation", "vendor": "vmware", "versions": [ { "status": "affected", "version": "17.x" } ] }, { "cpes": [ "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cloud_foundation", "vendor": "vmware", "versions": [ { "status": "affected", "version": "5.x" }, { "status": "affected", "version": "4.x" } ] }, { "cpes": [ "cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "esxi", "vendor": "vmware", "versions": [ { "status": "affected", "version": "0" }, { "status": "affected", "version": "7.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-22273", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T14:29:07.429312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-26T16:04:29.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "VMware ESXi", "vendor": "n/a", "versions": [ { "lessThan": "ESXi80U2sb-23305545", "status": "affected", "version": "8.0", "versionType": "custom" }, { "lessThan": "ESXi70U3sq-23794019", "status": "affected", "version": "7.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Linux" ], "product": "VMware Workstation", "vendor": "n/a", "versions": [ { "lessThan": "17.5.1", "status": "affected", "version": "17.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "VMware Fusion", "vendor": "n/a", "versions": [ { "lessThan": "13.5.1", "status": "affected", "version": "13.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "VMware Cloud Foundation (ESXi)", "vendor": "n/a", "versions": [ { "lessThan": "5.1.1", "status": "affected", "version": "5.x", "versionType": "custom" }, { "status": "affected", "version": "4.x" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability.\u0026nbsp;\u003c/span\u003eA malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability.\u00a0A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read/write vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-21T17:29:05.426Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2024-22273", "datePublished": "2024-05-21T17:29:05.426Z", "dateReserved": "2024-01-08T18:43:18.957Z", "dateUpdated": "2025-03-26T16:04:29.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20872 (GCVE-0-2023-20872)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-02-04 16:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read/write vulnerability
Summary
VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware Workstation Pro / Player (Workstation) and VMware Fusion |
Version: VMware Workstation (17.x) and VMware Fusion (13.x) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:21:32.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20872", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T16:38:45.998807Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T16:39:20.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "VMware Workstation Pro / Player (Workstation) and VMware Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware Workstation (17.x) and VMware Fusion (13.x)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read/write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T00:00:00.000Z", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ] } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2023-20872", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2022-11-01T00:00:00.000Z", "dateUpdated": "2025-02-04T16:39:20.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1142 (GCVE-0-2010-1142)
Vulnerability from cvelistv5
Published
2010-04-12 18:00
Modified
2024-08-07 01:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39394", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39394" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt" }, { "name": "1023833", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023833" }, { "name": "39198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39198" }, { "name": "1023832", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023832" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39394", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39394" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt" }, { "name": "1023833", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023833" }, { "name": "39198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39198" }, { "name": "1023832", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023832" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39394", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39394" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt", "refsource": "MISC", "url": "http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt" }, { "name": "1023833", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023833" }, { "name": "39198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39198" }, { "name": "1023832", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023832" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1142", "datePublished": "2010-04-12T18:00:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:06.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-4905 (GCVE-0-2017-4905)
Vulnerability from cvelistv5
Published
2017-06-07 18:00
Modified
2024-08-05 14:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information leak
Summary
VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | ESXi |
Version: 6.5 without patch ESXi650-201703410-SG Version: 6.0 U3 without patch ESXi600-201703401-SG Version: 6.0 U2 without patch ESXi600-201703403-SG Version: 6.0 U1 without patch ESXi600-201703402-SG Version: 5.5 without patch ESXi550-201703401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97164", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.5 without patch ESXi650-201703410-SG" }, { "status": "affected", "version": "6.0 U3 without patch ESXi600-201703401-SG" }, { "status": "affected", "version": "6.0 U2 without patch ESXi600-201703403-SG" }, { "status": "affected", "version": "6.0 U1 without patch ESXi600-201703402-SG" }, { "status": "affected", "version": "5.5 without patch ESXi550-201703401-SG" } ] }, { "product": "Workstation Pro / Player", "vendor": "VMware", "versions": [ { "status": "affected", "version": "12.x prior to 12.5.5" } ] }, { "product": "Fusion Pro / Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "8.x prior to 8.5.6" } ] } ], "datePublic": "2017-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "97164", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2017-4905", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.5 without patch ESXi650-201703410-SG" }, { "version_value": "6.0 U3 without patch ESXi600-201703401-SG" }, { "version_value": "6.0 U2 without patch ESXi600-201703403-SG" }, { "version_value": "6.0 U1 without patch ESXi600-201703402-SG" }, { "version_value": "5.5 without patch ESXi550-201703401-SG" } ] } }, { "product_name": "Workstation Pro / Player", "version": { "version_data": [ { "version_value": "12.x prior to 12.5.5" } ] } }, { "product_name": "Fusion Pro / Fusion", "version": { "version_data": [ { "version_value": "8.x prior to 8.5.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leak" } ] } ] }, "references": { "reference_data": [ { "name": "97164", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97164" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "name": "1038148", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038148" }, { "name": "1038149", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038149" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2017-4905", "datePublished": "2017-06-07T18:00:00", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-08-05T14:39:41.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6957 (GCVE-0-2018-6957)
Vulnerability from cvelistv5
Published
2018-03-15 19:00
Modified
2024-09-16 23:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | VMware | Workstation |
Version: 14.x before 14.1.1 Version: 12.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:17:17.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103431", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103431" }, { "name": "1040539", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040539" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "14.x before 14.1.1" }, { "status": "affected", "version": "12.x" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "10.x before 10.1.1" }, { "status": "affected", "version": "8.x" } ] } ], "datePublic": "2018-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-20T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "103431", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103431" }, { "name": "1040539", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040539" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0008.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "DATE_PUBLIC": "2018-03-15T00:00:00", "ID": "CVE-2018-6957", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "14.x before 14.1.1" }, { "version_value": "12.x" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "10.x before 10.1.1" }, { "version_value": "8.x" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "103431", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103431" }, { "name": "1040539", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040539" }, { "name": "https://www.vmware.com/security/advisories/VMSA-2018-0008.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0008.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2018-6957", "datePublished": "2018-03-15T19:00:00Z", "dateReserved": "2018-02-14T00:00:00", "dateUpdated": "2024-09-16T23:06:38.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5536 (GCVE-0-2019-5536)
Vulnerability from cvelistv5
Published
2019-10-28 15:56
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial-of-service vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | VMware ESXi, Workstation and Fusion |
Version: VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0019.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation and Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-28T15:56:36", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0019.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation and Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0019.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0019.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5536", "datePublished": "2019-10-28T15:56:36", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-3968 (GCVE-0-2020-3968)
Vulnerability from cvelistv5
Published
2020-06-25 14:43
Modified
2024-08-04 07:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write vulnerability
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | VMware | VMware ESXi |
Version: 7.0 before ESXi_7.0.0-1.20.16321839 Version: 6.7 before ESXi670-202004101-SG Version: 6.5 before ESXi650-202005401-SG |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-781/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "status": "affected", "version": "6.7 before ESXi670-202004101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-202005401-SG" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.5.5" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine\u0027s vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-30T15:06:03", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-781/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3968", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi", "version": { "version_data": [ { "version_value": "7.0 before ESXi_7.0.0-1.20.16321839" }, { "version_value": "6.7 before ESXi670-202004101-SG" }, { "version_value": "6.5 before ESXi650-202005401-SG" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.5.5" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.5.5" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine\u0027s vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-781/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-781/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3968", "datePublished": "2020-06-25T14:43:59", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1139 (GCVE-0-2010-1139)
Vulnerability from cvelistv5
Published
2010-04-12 18:00
Modified
2024-08-07 01:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39407" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "63606", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/63606" }, { "name": "39201", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39201" }, { "name": "39215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39215" }, { "name": "1023835", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1023835" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39407" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "63606", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/63606" }, { "name": "39201", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39201" }, { "name": "39215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39215" }, { "name": "1023835", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1023835" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "39206", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39206" }, { "name": "[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "name": "39407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39407" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "name": "63606", "refsource": "OSVDB", "url": "http://osvdb.org/63606" }, { "name": "39201", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39201" }, { "name": "39215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39215" }, { "name": "1023835", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1023835" }, { "name": "20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1139", "datePublished": "2010-04-12T18:00:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:06.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2146 (GCVE-0-2011-2146)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44904", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44904" }, { "name": "vmware-mountvmhgfs-info-disc(67813)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67813" }, { "name": "48098", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48098" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "44840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/8711677" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "44904", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44904" }, { "name": "vmware-mountvmhgfs-info-disc(67813)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67813" }, { "name": "48098", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48098" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "44840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/8711677" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44904", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44904" }, { "name": "vmware-mountvmhgfs-info-disc(67813)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67813" }, { "name": "48098", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48098" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "44840", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44840" }, { "name": "1025601", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025601" }, { "name": "openSUSE-SU-2011:0617", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/8711677" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2146", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-05-17T00:00:00", "dateUpdated": "2024-08-06T22:53:16.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3868 (GCVE-0-2011-3868)
Vulnerability from cvelistv5
Published
2011-10-07 20:00
Modified
2024-08-06 23:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in VMware Workstation 7.x before 7.1.5, VMware Player 3.x before 3.1.5, VMware Fusion 3.1.x before 3.1.3, and VMware AMS allows remote attackers to execute arbitrary code via a crafted UDF filesystem in an ISO image.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:31.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46241" }, { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "49942", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49942" }, { "name": "1026139", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026139" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0011.html" }, { "name": "76060", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/76060" }, { "name": "20111005 VMSA-2011-0011 VMware hosted products address remote code execution vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/520005/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in VMware Workstation 7.x before 7.1.5, VMware Player 3.x before 3.1.5, VMware Fusion 3.1.x before 3.1.3, and VMware AMS allows remote attackers to execute arbitrary code via a crafted UDF filesystem in an ISO image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46241" }, { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "49942", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49942" }, { "name": "1026139", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026139" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0011.html" }, { "name": "76060", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/76060" }, { "name": "20111005 VMSA-2011-0011 VMware hosted products address remote code execution vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/520005/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in VMware Workstation 7.x before 7.1.5, VMware Player 3.x before 3.1.5, VMware Fusion 3.1.x before 3.1.3, and VMware AMS allows remote attackers to execute arbitrary code via a crafted UDF filesystem in an ISO image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/46241" }, { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "49942", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49942" }, { "name": "1026139", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026139" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0011.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0011.html" }, { "name": "76060", "refsource": "OSVDB", "url": "http://osvdb.org/76060" }, { "name": "20111005 VMSA-2011-0011 VMware hosted products address remote code execution vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/520005/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3868", "datePublished": "2011-10-07T20:00:00", "dateReserved": "2011-09-29T00:00:00", "dateUpdated": "2024-08-06T23:53:31.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7461 (GCVE-0-2016-7461)
Vulnerability from cvelistv5
Published
2016-12-29 09:02
Modified
2024-08-06 01:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The drag-and-drop (aka DnD) function in VMware Workstation Pro 12.x before 12.5.2 and VMware Workstation Player 12.x before 12.5.2 and VMware Fusion and Fusion Pro 8.x before 8.5.2 allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (out-of-bounds memory access on the host OS) via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94280", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94280" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0019.html" }, { "name": "1037282", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037282" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The drag-and-drop (aka DnD) function in VMware Workstation Pro 12.x before 12.5.2 and VMware Workstation Player 12.x before 12.5.2 and VMware Fusion and Fusion Pro 8.x before 8.5.2 allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (out-of-bounds memory access on the host OS) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-27T09:57:01", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "name": "94280", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94280" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0019.html" }, { "name": "1037282", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037282" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2016-7461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The drag-and-drop (aka DnD) function in VMware Workstation Pro 12.x before 12.5.2 and VMware Workstation Player 12.x before 12.5.2 and VMware Fusion and Fusion Pro 8.x before 8.5.2 allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (out-of-bounds memory access on the host OS) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94280", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94280" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2016-0019.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2016-0019.html" }, { "name": "1037282", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037282" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2016-7461", "datePublished": "2016-12-29T09:02:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2340 (GCVE-0-2015-2340)
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:15.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75092" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75092" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032529", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75092", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75092" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032530" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2340", "datePublished": "2015-06-13T14:00:00", "dateReserved": "2015-03-18T00:00:00", "dateUpdated": "2024-08-06T05:10:15.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5520 (GCVE-0-2019-5520)
Vulnerability from cvelistv5
Published
2019-04-15 17:12
Modified
2024-08-04 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds read vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-369/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 before ESXi670-201904101-SG" }, { "status": "affected", "version": "6.5 before ESXi650-201903001" } ] }, { "product": "Workstation", "vendor": "VMware", "versions": [ { "status": "affected", "version": "15.x before 15.0.3" }, { "status": "affected", "version": "14.x before 14.1.6" } ] }, { "product": "Fusion", "vendor": "VMware", "versions": [ { "status": "affected", "version": "11.x before 11.0.3" }, { "status": "affected", "version": "10.x before 10.1.6" } ] } ], "datePublic": "2019-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-17T15:06:05", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-369/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5520", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESXi", "version": { "version_data": [ { "version_value": "6.7 before ESXi670-201904101-SG" }, { "version_value": "6.5 before ESXi650-201903001" } ] } }, { "product_name": "Workstation", "version": { "version_data": [ { "version_value": "15.x before 15.0.3" }, { "version_value": "14.x before 14.1.6" } ] } }, { "product_name": "Fusion", "version": { "version_data": [ { "version_value": "11.x before 11.0.3" }, { "version_value": "10.x before 10.1.6" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-369/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-369/" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5520", "datePublished": "2019-04-15T17:12:06", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2337 (GCVE-0-2015-2337)
Vulnerability from cvelistv5
Published
2015-06-13 14:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:16.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032530" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1032529", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032530" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032529", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032529" }, { "name": "75095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75095" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "name": "1032530", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032530" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2337", "datePublished": "2015-06-13T14:00:00", "dateReserved": "2015-03-18T00:00:00", "dateUpdated": "2024-08-06T05:10:16.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1244 (GCVE-0-2009-1244)
Vulnerability from cvelistv5
Published
2009-04-13 16:00
Modified
2024-08-07 05:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:04:49.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "vmware-virtualmachine-code-execution(49834)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49834" }, { "name": "34471", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34471" }, { "name": "1022031", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022031" }, { "name": "53634", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/53634" }, { "name": "oval:org.mitre.oval:def:6065", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0006.html" }, { "name": "ADV-2009-0944", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "name": "[security-announce] 20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000055.html" }, { "name": "20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502615/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "vmware-virtualmachine-code-execution(49834)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49834" }, { "name": "34471", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34471" }, { "name": "1022031", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022031" }, { "name": "53634", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/53634" }, { "name": "oval:org.mitre.oval:def:6065", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0006.html" }, { "name": "ADV-2009-0944", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "name": "[security-announce] 20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000055.html" }, { "name": "20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502615/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1244", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201209-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "vmware-virtualmachine-code-execution(49834)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49834" }, { "name": "34471", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34471" }, { "name": "1022031", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022031" }, { "name": "53634", "refsource": "OSVDB", "url": "http://osvdb.org/53634" }, { "name": "oval:org.mitre.oval:def:6065", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0006.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0006.html" }, { "name": "ADV-2009-0944", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "name": "[security-announce] 20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000055.html" }, { "name": "20090410 VMSA-2009-0006 VMware Hosted products and patches for ESX and ESXi resolve a critical security vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/502615/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1244", "datePublished": "2009-04-13T16:00:00", "dateReserved": "2009-04-06T00:00:00", "dateUpdated": "2024-08-07T05:04:49.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-12-14 19:15
Modified
2025-04-18 15:15
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 8.0 | |
vmware | fusion | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDC4AE5D-3ED6-4462-90D3-095CF94459BC", "versionEndExcluding": "16.2.5", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D5A3E22-84B6-4118-93A1-6248491F35B4", "versionEndExcluding": "12.2.5", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de escritura fuera de los l\u00edmites en el controlador USB 2.0 (EHCI). Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host. En ESXi, la explotaci\u00f3n est\u00e1 contenida dentro del entorno limitado de VMX, mientras que, en Workstation y Fusion, esto puede provocar la ejecuci\u00f3n de c\u00f3digo en la m\u00e1quina donde est\u00e1 instalado Workstation o Fusion." } ], "id": "CVE-2022-31705", "lastModified": "2025-04-18T15:15:51.587", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-12-14T19:15:13.197", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0033.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-25 21:15
Modified
2025-02-04 17:15
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Summary
VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:13.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FFED80D5-91E2-4F5E-B373-988FE6B423AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:17.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B52B9830-14D3-4CB5-9CE9-7A805820276A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation." } ], "id": "CVE-2023-20872", "lastModified": "2025-02-04T17:15:10.890", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-25T21:15:10.073", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-05 18:15
Modified
2025-03-27 20:15
Severity ?
9.3 (Critical) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | fusion | * | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0BFB423-5C6D-40F3-960A-53D9955E7621", "versionEndExcluding": "17.5.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*", "matchCriteriaId": "BC6F088D-0404-4588-9788-7A5903C5BC82", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50649AB8-57FD-4210-A7F4-3AD7D00F6A91", "versionEndExcluding": "13.5.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de Use After Free en el controlador USB XHCI. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host. En ESXi, la explotaci\u00f3n est\u00e1 contenida dentro del entorno limitado de VMX, mientras que, en Workstation y Fusion, esto puede provocar la ejecuci\u00f3n de c\u00f3digo en la m\u00e1quina donde est\u00e1 instalado Workstation o Fusion." } ], "id": "CVE-2024-22252", "lastModified": "2025-03-27T20:15:21.593", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 6.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-05T18:15:47.713", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor's memory. Additional conditions beyond the attacker's control need to be present for exploitation to be possible.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit, Third Party Advisory, VDB Entry | |
security@vmware.com | http://seclists.org/fulldisclosure/2020/Jul/22 | Mailing List, Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Jul/22 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor\u0027s memory. Additional conditions beyond the attacker\u0027s control need to be present for exploitation to be possible." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202006401-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.2) y Fusion (versiones 11.x anteriores a 11.5. 2), contiene una filtraci\u00f3n de informaci\u00f3n en el controlador USB EHCI. Un actor malicioso con acceso local a una m\u00e1quina virtual puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria del hipervisor. Las condiciones adicionales m\u00e1s all\u00e1 del control del atacante deben estar presentes para que la explotaci\u00f3n pueda ser posible" } ], "id": "CVE-2020-3964", "lastModified": "2024-11-21T05:32:04.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.117", "references": [ { "source": "security@vmware.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" }, { "source": "security@vmware.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-20 16:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0021.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0021.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "06D524E6-E4CA-47CE-BF68-0D33CB9391A4", "versionEndExcluding": "11.5.1", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B332C2-587E-49DB-8346-7F87BBE2E44F", "versionEndExcluding": "15.5.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain a denial-of-service vulnerability in the RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM." }, { "lang": "es", "value": "VMware Workstation (versiones 15.x anteriores a 15.5.1) y Fusion (versiones 11.x anteriores a 11.5.1), contienen una vulnerabilidad de denegaci\u00f3n de servicio en el controlador RPC. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a atacantes con privilegios de usuario normales crear una condici\u00f3n de denegaci\u00f3n de servicio en su propia VM." } ], "id": "CVE-2019-5542", "lastModified": "2024-11-21T04:45:09.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-20T16:15:13.153", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-04 13:29
Modified
2025-01-14 19:29
Severity ?
Summary
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
References
▶ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html | Mailing List, Third Party Advisory | |
secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4609 | Third Party Advisory | |
secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4611 | Third Party Advisory | |
secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4613 | Third Party Advisory | |
secure@intel.com | http://nvidia.custhelp.com/app/answers/detail/a_id/4614 | Third Party Advisory | |
secure@intel.com | http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html | Exploit, Third Party Advisory, VDB Entry | |
secure@intel.com | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt | Third Party Advisory | |
secure@intel.com | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt | Third Party Advisory | |
secure@intel.com | http://www.kb.cert.org/vuls/id/584653 | Third Party Advisory, US Government Resource | |
secure@intel.com | http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html | Patch, Third Party Advisory | |
secure@intel.com | http://www.securityfocus.com/bid/102371 | Third Party Advisory, VDB Entry | |
secure@intel.com | http://www.securitytracker.com/id/1040071 | Third Party Advisory, VDB Entry | |
secure@intel.com | http://xenbits.xen.org/xsa/advisory-254.html | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:0292 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/security/vulnerabilities/speculativeexecution | Third Party Advisory | |
secure@intel.com | https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ | Third Party Advisory | |
secure@intel.com | https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ | Third Party Advisory | |
secure@intel.com | https://cdrdv2.intel.com/v1/dl/getContent/685359 | Vendor Advisory | |
secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf | Third Party Advisory | |
secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | Third Party Advisory | |
secure@intel.com | https://cert.vde.com/en-us/advisories/vde-2018-002 | Third Party Advisory | |
secure@intel.com | https://cert.vde.com/en-us/advisories/vde-2018-003 | Third Party Advisory | |
secure@intel.com | https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | Third Party Advisory | |
secure@intel.com | https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html | Third Party Advisory | |
secure@intel.com | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Third Party Advisory | |
secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html | Mailing List, Third Party Advisory | |
secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html | Mailing List, Third Party Advisory | |
secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html | Mailing List, Third Party Advisory | |
secure@intel.com | https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html | Mailing List, Third Party Advisory | |
secure@intel.com | https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html | Mailing List, Third Party Advisory | |
secure@intel.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 | Patch, Third Party Advisory, Vendor Advisory | |
secure@intel.com | https://seclists.org/bugtraq/2019/Jun/36 | Issue Tracking, Mailing List, Third Party Advisory | |
secure@intel.com | https://security.gentoo.org/glsa/201810-06 | Third Party Advisory | |
secure@intel.com | https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html | Third Party Advisory | |
secure@intel.com | https://security.netapp.com/advisory/ntap-20180104-0001/ | Third Party Advisory | |
secure@intel.com | https://spectreattack.com/ | Technical Description, Third Party Advisory | |
secure@intel.com | https://support.citrix.com/article/CTX231399 | Third Party Advisory | |
secure@intel.com | https://support.f5.com/csp/article/K91229003 | Third Party Advisory | |
secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us | Third Party Advisory | |
secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us | Third Party Advisory | |
secure@intel.com | https://support.lenovo.com/us/en/solutions/LEN-18282 | Third Party Advisory | |
secure@intel.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3540-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3540-2/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3541-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3541-2/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3542-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3542-2/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3549-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3580-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3597-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3597-2/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/usn/usn-3516-1/ | Third Party Advisory | |
secure@intel.com | https://www.debian.org/security/2018/dsa-4187 | Third Party Advisory | |
secure@intel.com | https://www.debian.org/security/2018/dsa-4188 | Third Party Advisory | |
secure@intel.com | https://www.exploit-db.com/exploits/43427/ | Exploit, Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.kb.cert.org/vuls/id/180049 | Third Party Advisory, US Government Resource | |
secure@intel.com | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 | Third Party Advisory | |
secure@intel.com | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
secure@intel.com | https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ | Third Party Advisory | |
secure@intel.com | https://www.synology.com/support/security/Synology_SA_18_01 | Third Party Advisory | |
secure@intel.com | https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4609 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4611 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4613 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/4614 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/584653 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102371 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040071 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-254.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:0292 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/vulnerabilities/speculativeexecution | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cdrdv2.intel.com/v1/dl/getContent/685359 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2018-002 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2018-003 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 | Patch, Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Jun/36 | Issue Tracking, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201810-06 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180104-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://spectreattack.com/ | Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX231399 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K91229003 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/us/en/solutions/LEN-18282 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3540-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3540-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3541-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3541-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3542-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3542-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3549-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3580-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3597-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3597-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/usn/usn-3516-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4187 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4188 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/43427/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/180049 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_01 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | atom_c | c2308 | |
intel | atom_c | c2316 | |
intel | atom_c | c2338 | |
intel | atom_c | c2350 | |
intel | atom_c | c2358 | |
intel | atom_c | c2508 | |
intel | atom_c | c2516 | |
intel | atom_c | c2518 | |
intel | atom_c | c2530 | |
intel | atom_c | c2538 | |
intel | atom_c | c2550 | |
intel | atom_c | c2558 | |
intel | atom_c | c2718 | |
intel | atom_c | c2730 | |
intel | atom_c | c2738 | |
intel | atom_c | c2750 | |
intel | atom_c | c2758 | |
intel | atom_c | c3308 | |
intel | atom_c | c3338 | |
intel | atom_c | c3508 | |
intel | atom_c | c3538 | |
intel | atom_c | c3558 | |
intel | atom_c | c3708 | |
intel | atom_c | c3750 | |
intel | atom_c | c3758 | |
intel | atom_c | c3808 | |
intel | atom_c | c3830 | |
intel | atom_c | c3850 | |
intel | atom_c | c3858 | |
intel | atom_c | c3950 | |
intel | atom_c | c3955 | |
intel | atom_c | c3958 | |
intel | atom_e | e3805 | |
intel | atom_e | e3815 | |
intel | atom_e | e3825 | |
intel | atom_e | e3826 | |
intel | atom_e | e3827 | |
intel | atom_e | e3845 | |
intel | atom_x3 | c3130 | |
intel | atom_x3 | c3200rk | |
intel | atom_x3 | c3205rk | |
intel | atom_x3 | c3230rk | |
intel | atom_x3 | c3235rk | |
intel | atom_x3 | c3265rk | |
intel | atom_x3 | c3295rk | |
intel | atom_x3 | c3405 | |
intel | atom_x3 | c3445 | |
intel | atom_x5-e3930 | - | |
intel | atom_x5-e3940 | - | |
intel | atom_x7-e3950 | - | |
intel | atom_z | z2420 | |
intel | atom_z | z2460 | |
intel | atom_z | z2480 | |
intel | atom_z | z2520 | |
intel | atom_z | z2560 | |
intel | atom_z | z2580 | |
intel | atom_z | z2760 | |
intel | atom_z | z3460 | |
intel | atom_z | z3480 | |
intel | atom_z | z3530 | |
intel | atom_z | z3560 | |
intel | atom_z | z3570 | |
intel | atom_z | z3580 | |
intel | atom_z | z3590 | |
intel | atom_z | z3735d | |
intel | atom_z | z3735e | |
intel | atom_z | z3735f | |
intel | atom_z | z3735g | |
intel | atom_z | z3736f | |
intel | atom_z | z3736g | |
intel | atom_z | z3740 | |
intel | atom_z | z3740d | |
intel | atom_z | z3745 | |
intel | atom_z | z3745d | |
intel | atom_z | z3770 | |
intel | atom_z | z3770d | |
intel | atom_z | z3775 | |
intel | atom_z | z3775d | |
intel | atom_z | z3785 | |
intel | atom_z | z3795 | |
intel | celeron_j | j1750 | |
intel | celeron_j | j1800 | |
intel | celeron_j | j1850 | |
intel | celeron_j | j1900 | |
intel | celeron_j | j3060 | |
intel | celeron_j | j3160 | |
intel | celeron_j | j3355 | |
intel | celeron_j | j3455 | |
intel | celeron_j | j4005 | |
intel | celeron_j | j4105 | |
intel | celeron_n | n2805 | |
intel | celeron_n | n2806 | |
intel | celeron_n | n2807 | |
intel | celeron_n | n2808 | |
intel | celeron_n | n2810 | |
intel | celeron_n | n2815 | |
intel | celeron_n | n2820 | |
intel | celeron_n | n2830 | |
intel | celeron_n | n2840 | |
intel | celeron_n | n2910 | |
intel | celeron_n | n2920 | |
intel | celeron_n | n2930 | |
intel | celeron_n | n2940 | |
intel | celeron_n | n3000 | |
intel | celeron_n | n3010 | |
intel | celeron_n | n3050 | |
intel | celeron_n | n3060 | |
intel | celeron_n | n3150 | |
intel | celeron_n | n3160 | |
intel | celeron_n | n3350 | |
intel | celeron_n | n3450 | |
intel | celeron_n | n4000 | |
intel | celeron_n | n4100 | |
intel | core_i3 | 330e | |
intel | core_i3 | 330m | |
intel | core_i3 | 330um | |
intel | core_i3 | 350m | |
intel | core_i3 | 370m | |
intel | core_i3 | 380m | |
intel | core_i3 | 380um | |
intel | core_i3 | 390m | |
intel | core_i3 | 530 | |
intel | core_i3 | 540 | |
intel | core_i3 | 550 | |
intel | core_i3 | 560 | |
intel | core_i3 | 2100 | |
intel | core_i3 | 2100t | |
intel | core_i3 | 2102 | |
intel | core_i3 | 2105 | |
intel | core_i3 | 2115c | |
intel | core_i3 | 2120 | |
intel | core_i3 | 2120t | |
intel | core_i3 | 2125 | |
intel | core_i3 | 2130 | |
intel | core_i3 | 2310e | |
intel | core_i3 | 2310m | |
intel | core_i3 | 2312m | |
intel | core_i3 | 2328m | |
intel | core_i3 | 2330e | |
intel | core_i3 | 2330m | |
intel | core_i3 | 2340ue | |
intel | core_i3 | 2348m | |
intel | core_i3 | 2350m | |
intel | core_i3 | 2357m | |
intel | core_i3 | 2365m | |
intel | core_i3 | 2367m | |
intel | core_i3 | 2370m | |
intel | core_i3 | 2375m | |
intel | core_i3 | 2377m | |
intel | core_i3 | 3110m | |
intel | core_i3 | 3115c | |
intel | core_i3 | 3120m | |
intel | core_i3 | 3120me | |
intel | core_i3 | 3130m | |
intel | core_i3 | 3210 | |
intel | core_i3 | 3217u | |
intel | core_i3 | 3217ue | |
intel | core_i3 | 3220 | |
intel | core_i3 | 3220t | |
intel | core_i3 | 3225 | |
intel | core_i3 | 3227u | |
intel | core_i3 | 3229y | |
intel | core_i3 | 3240 | |
intel | core_i3 | 3240t | |
intel | core_i3 | 3245 | |
intel | core_i3 | 3250 | |
intel | core_i3 | 3250t | |
intel | core_i3 | 4000m | |
intel | core_i3 | 4005u | |
intel | core_i3 | 4010u | |
intel | core_i3 | 4010y | |
intel | core_i3 | 4012y | |
intel | core_i3 | 4020y | |
intel | core_i3 | 4025u | |
intel | core_i3 | 4030u | |
intel | core_i3 | 4030y | |
intel | core_i3 | 4100e | |
intel | core_i3 | 4100m | |
intel | core_i3 | 4100u | |
intel | core_i3 | 4102e | |
intel | core_i3 | 4110e | |
intel | core_i3 | 4110m | |
intel | core_i3 | 4112e | |
intel | core_i3 | 4120u | |
intel | core_i3 | 4130 | |
intel | core_i3 | 4130t | |
intel | core_i3 | 4150 | |
intel | core_i3 | 4150t | |
intel | core_i3 | 4158u | |
intel | core_i3 | 4160 | |
intel | core_i3 | 4160t | |
intel | core_i3 | 4170 | |
intel | core_i3 | 4170t | |
intel | core_i3 | 4330 | |
intel | core_i3 | 4330t | |
intel | core_i3 | 4330te | |
intel | core_i3 | 4340 | |
intel | core_i3 | 4340te | |
intel | core_i3 | 4350 | |
intel | core_i3 | 4350t | |
intel | core_i3 | 4360 | |
intel | core_i3 | 4360t | |
intel | core_i3 | 4370 | |
intel | core_i3 | 4370t | |
intel | core_i3 | 5005u | |
intel | core_i3 | 5010u | |
intel | core_i3 | 5015u | |
intel | core_i3 | 5020u | |
intel | core_i3 | 5157u | |
intel | core_i3 | 6006u | |
intel | core_i3 | 6098p | |
intel | core_i3 | 6100 | |
intel | core_i3 | 6100e | |
intel | core_i3 | 6100h | |
intel | core_i3 | 6100t | |
intel | core_i3 | 6100te | |
intel | core_i3 | 6100u | |
intel | core_i3 | 6102e | |
intel | core_i3 | 6157u | |
intel | core_i3 | 6167u | |
intel | core_i3 | 6300 | |
intel | core_i3 | 6300t | |
intel | core_i3 | 6320 | |
intel | core_i3 | 8100 | |
intel | core_i3 | 8350k | |
intel | core_i5 | 430m | |
intel | core_i5 | 430um | |
intel | core_i5 | 450m | |
intel | core_i5 | 460m | |
intel | core_i5 | 470um | |
intel | core_i5 | 480m | |
intel | core_i5 | 520e | |
intel | core_i5 | 520m | |
intel | core_i5 | 520um | |
intel | core_i5 | 540m | |
intel | core_i5 | 540um | |
intel | core_i5 | 560m | |
intel | core_i5 | 560um | |
intel | core_i5 | 580m | |
intel | core_i5 | 650 | |
intel | core_i5 | 655k | |
intel | core_i5 | 660 | |
intel | core_i5 | 661 | |
intel | core_i5 | 670 | |
intel | core_i5 | 680 | |
intel | core_i5 | 750 | |
intel | core_i5 | 750s | |
intel | core_i5 | 760 | |
intel | core_i5 | 2300 | |
intel | core_i5 | 2310 | |
intel | core_i5 | 2320 | |
intel | core_i5 | 2380p | |
intel | core_i5 | 2390t | |
intel | core_i5 | 2400 | |
intel | core_i5 | 2400s | |
intel | core_i5 | 2405s | |
intel | core_i5 | 2410m | |
intel | core_i5 | 2430m | |
intel | core_i5 | 2435m | |
intel | core_i5 | 2450m | |
intel | core_i5 | 2450p | |
intel | core_i5 | 2467m | |
intel | core_i5 | 2500 | |
intel | core_i5 | 2500k | |
intel | core_i5 | 2500s | |
intel | core_i5 | 2500t | |
intel | core_i5 | 2510e | |
intel | core_i5 | 2515e | |
intel | core_i5 | 2520m | |
intel | core_i5 | 2537m | |
intel | core_i5 | 2540m | |
intel | core_i5 | 2550k | |
intel | core_i5 | 2557m | |
intel | core_i5 | 3210m | |
intel | core_i5 | 3230m | |
intel | core_i5 | 3317u | |
intel | core_i5 | 3320m | |
intel | core_i5 | 3330 | |
intel | core_i5 | 3330s | |
intel | core_i5 | 3337u | |
intel | core_i5 | 3339y | |
intel | core_i5 | 3340 | |
intel | core_i5 | 3340m | |
intel | core_i5 | 3340s | |
intel | core_i5 | 3350p | |
intel | core_i5 | 3360m | |
intel | core_i5 | 3380m | |
intel | core_i5 | 3427u | |
intel | core_i5 | 3437u | |
intel | core_i5 | 3439y | |
intel | core_i5 | 3450 | |
intel | core_i5 | 3450s | |
intel | core_i5 | 3470 | |
intel | core_i5 | 3470s | |
intel | core_i5 | 3470t | |
intel | core_i5 | 3475s | |
intel | core_i5 | 3550 | |
intel | core_i5 | 3550s | |
intel | core_i5 | 3570 | |
intel | core_i5 | 3570k | |
intel | core_i5 | 3570s | |
intel | core_i5 | 3570t | |
intel | core_i5 | 3610me | |
intel | core_i5 | 4200h | |
intel | core_i5 | 4200m | |
intel | core_i5 | 4200u | |
intel | core_i5 | 4200y | |
intel | core_i5 | 4202y | |
intel | core_i5 | 4210h | |
intel | core_i5 | 4210m | |
intel | core_i5 | 4210u | |
intel | core_i5 | 4210y | |
intel | core_i5 | 4220y | |
intel | core_i5 | 4250u | |
intel | core_i5 | 4258u | |
intel | core_i5 | 4260u | |
intel | core_i5 | 4278u | |
intel | core_i5 | 4288u | |
intel | core_i5 | 4300m | |
intel | core_i5 | 4300u | |
intel | core_i5 | 4300y | |
intel | core_i5 | 4302y | |
intel | core_i5 | 4308u | |
intel | core_i5 | 4310m | |
intel | core_i5 | 4310u | |
intel | core_i5 | 4330m | |
intel | core_i5 | 4340m | |
intel | core_i5 | 4350u | |
intel | core_i5 | 4360u | |
intel | core_i5 | 4400e | |
intel | core_i5 | 4402e | |
intel | core_i5 | 4402ec | |
intel | core_i5 | 4410e | |
intel | core_i5 | 4422e | |
intel | core_i5 | 4430 | |
intel | core_i5 | 4430s | |
intel | core_i5 | 4440 | |
intel | core_i5 | 4440s | |
intel | core_i5 | 4460 | |
intel | core_i5 | 4460s | |
intel | core_i5 | 4460t | |
intel | core_i5 | 4570 | |
intel | core_i5 | 4570r | |
intel | core_i5 | 4570s | |
intel | core_i5 | 4570t | |
intel | core_i5 | 4570te | |
intel | core_i5 | 4590 | |
intel | core_i5 | 4590s | |
intel | core_i5 | 4590t | |
intel | core_i5 | 4670 | |
intel | core_i5 | 4670k | |
intel | core_i5 | 4670r | |
intel | core_i5 | 4670s | |
intel | core_i5 | 4670t | |
intel | core_i5 | 4690 | |
intel | core_i5 | 4690k | |
intel | core_i5 | 4690s | |
intel | core_i5 | 4690t | |
intel | core_i5 | 5200u | |
intel | core_i5 | 5250u | |
intel | core_i5 | 5257u | |
intel | core_i5 | 5287u | |
intel | core_i5 | 5300u | |
intel | core_i5 | 5350h | |
intel | core_i5 | 5350u | |
intel | core_i5 | 5575r | |
intel | core_i5 | 5675c | |
intel | core_i5 | 5675r | |
intel | core_i5 | 6200u | |
intel | core_i5 | 6260u | |
intel | core_i5 | 6267u | |
intel | core_i5 | 6287u | |
intel | core_i5 | 6300hq | |
intel | core_i5 | 6300u | |
intel | core_i5 | 6350hq | |
intel | core_i5 | 6360u | |
intel | core_i5 | 6400 | |
intel | core_i5 | 6400t | |
intel | core_i5 | 6402p | |
intel | core_i5 | 6440eq | |
intel | core_i5 | 6440hq | |
intel | core_i5 | 6442eq | |
intel | core_i5 | 6500 | |
intel | core_i5 | 6500t | |
intel | core_i5 | 6500te | |
intel | core_i5 | 6585r | |
intel | core_i5 | 6600 | |
intel | core_i5 | 6600k | |
intel | core_i5 | 6600t | |
intel | core_i5 | 6685r | |
intel | core_i5 | 8250u | |
intel | core_i5 | 8350u | |
intel | core_i5 | 8400 | |
intel | core_i5 | 8600k | |
intel | core_i7 | 7y75 | |
intel | core_i7 | 610e | |
intel | core_i7 | 620le | |
intel | core_i7 | 620lm | |
intel | core_i7 | 620m | |
intel | core_i7 | 620ue | |
intel | core_i7 | 620um | |
intel | core_i7 | 640lm | |
intel | core_i7 | 640m | |
intel | core_i7 | 640um | |
intel | core_i7 | 660lm | |
intel | core_i7 | 660ue | |
intel | core_i7 | 660um | |
intel | core_i7 | 680um | |
intel | core_i7 | 720qm | |
intel | core_i7 | 740qm | |
intel | core_i7 | 820qm | |
intel | core_i7 | 840qm | |
intel | core_i7 | 860 | |
intel | core_i7 | 860s | |
intel | core_i7 | 870 | |
intel | core_i7 | 870s | |
intel | core_i7 | 875k | |
intel | core_i7 | 880 | |
intel | core_i7 | 920 | |
intel | core_i7 | 920xm | |
intel | core_i7 | 930 | |
intel | core_i7 | 940 | |
intel | core_i7 | 940xm | |
intel | core_i7 | 950 | |
intel | core_i7 | 960 | |
intel | core_i7 | 965 | |
intel | core_i7 | 970 | |
intel | core_i7 | 975 | |
intel | core_i7 | 980 | |
intel | core_i7 | 980x | |
intel | core_i7 | 990x | |
intel | core_i7 | 2600 | |
intel | core_i7 | 2600k | |
intel | core_i7 | 2600s | |
intel | core_i7 | 2610ue | |
intel | core_i7 | 2617m | |
intel | core_i7 | 2620m | |
intel | core_i7 | 2629m | |
intel | core_i7 | 2630qm | |
intel | core_i7 | 2635qm | |
intel | core_i7 | 2637m | |
intel | core_i7 | 2640m | |
intel | core_i7 | 2649m | |
intel | core_i7 | 2655le | |
intel | core_i7 | 2657m | |
intel | core_i7 | 2670qm | |
intel | core_i7 | 2675qm | |
intel | core_i7 | 2677m | |
intel | core_i7 | 2700k | |
intel | core_i7 | 2710qe | |
intel | core_i7 | 2715qe | |
intel | core_i7 | 2720qm | |
intel | core_i7 | 2760qm | |
intel | core_i7 | 2820qm | |
intel | core_i7 | 2860qm | |
intel | core_i7 | 2920xm | |
intel | core_i7 | 2960xm | |
intel | core_i7 | 3517u | |
intel | core_i7 | 3517ue | |
intel | core_i7 | 3520m | |
intel | core_i7 | 3537u | |
intel | core_i7 | 3540m | |
intel | core_i7 | 3555le | |
intel | core_i7 | 3610qe | |
intel | core_i7 | 3610qm | |
intel | core_i7 | 3612qe | |
intel | core_i7 | 3612qm | |
intel | core_i7 | 3615qe | |
intel | core_i7 | 3615qm | |
intel | core_i7 | 3630qm | |
intel | core_i7 | 3632qm | |
intel | core_i7 | 3635qm | |
intel | core_i7 | 3667u | |
intel | core_i7 | 3687u | |
intel | core_i7 | 3689y | |
intel | core_i7 | 3720qm | |
intel | core_i7 | 3740qm | |
intel | core_i7 | 3770 | |
intel | core_i7 | 3770k | |
intel | core_i7 | 3770s | |
intel | core_i7 | 3770t | |
intel | core_i7 | 3820qm | |
intel | core_i7 | 3840qm | |
intel | core_i7 | 4500u | |
intel | core_i7 | 4510u | |
intel | core_i7 | 4550u | |
intel | core_i7 | 4558u | |
intel | core_i7 | 4578u | |
intel | core_i7 | 4600m | |
intel | core_i7 | 4600u | |
intel | core_i7 | 4610m | |
intel | core_i7 | 4610y | |
intel | core_i7 | 4650u | |
intel | core_i7 | 4700ec | |
intel | core_i7 | 4700eq | |
intel | core_i7 | 4700hq | |
intel | core_i7 | 4700mq | |
intel | core_i7 | 4702ec | |
intel | core_i7 | 4702hq | |
intel | core_i7 | 4702mq | |
intel | core_i7 | 4710hq | |
intel | core_i7 | 4710mq | |
intel | core_i7 | 4712hq | |
intel | core_i7 | 4712mq | |
intel | core_i7 | 4720hq | |
intel | core_i7 | 4722hq | |
intel | core_i7 | 4750hq | |
intel | core_i7 | 4760hq | |
intel | core_i7 | 4765t | |
intel | core_i7 | 4770 | |
intel | core_i7 | 4770hq | |
intel | core_i7 | 4770k | |
intel | core_i7 | 4770r | |
intel | core_i7 | 4770s | |
intel | core_i7 | 4770t | |
intel | core_i7 | 4770te | |
intel | core_i7 | 4771 | |
intel | core_i7 | 4785t | |
intel | core_i7 | 4790 | |
intel | core_i7 | 4790k | |
intel | core_i7 | 4790s | |
intel | core_i7 | 4790t | |
intel | core_i7 | 4800mq | |
intel | core_i7 | 4810mq | |
intel | core_i7 | 4850hq | |
intel | core_i7 | 4860hq | |
intel | core_i7 | 4870hq | |
intel | core_i7 | 4900mq | |
intel | core_i7 | 4910mq | |
intel | core_i7 | 4950hq | |
intel | core_i7 | 4960hq | |
intel | core_i7 | 4980hq | |
intel | core_i7 | 5500u | |
intel | core_i7 | 5550u | |
intel | core_i7 | 5557u | |
intel | core_i7 | 5600u | |
intel | core_i7 | 5650u | |
intel | core_i7 | 5700eq | |
intel | core_i7 | 5700hq | |
intel | core_i7 | 5750hq | |
intel | core_i7 | 5775c | |
intel | core_i7 | 5775r | |
intel | core_i7 | 5850eq | |
intel | core_i7 | 5850hq | |
intel | core_i7 | 5950hq | |
intel | core_i7 | 7500u | |
intel | core_i7 | 7560u | |
intel | core_i7 | 7567u | |
intel | core_i7 | 7600u | |
intel | core_i7 | 7660u | |
intel | core_i7 | 7700 | |
intel | core_i7 | 7700hq | |
intel | core_i7 | 7700k | |
intel | core_i7 | 7700t | |
intel | core_i7 | 7820eq | |
intel | core_i7 | 7820hk | |
intel | core_i7 | 7820hq | |
intel | core_i7 | 7920hq | |
intel | core_i7 | 8550u | |
intel | core_i7 | 8650u | |
intel | core_i7 | 8700 | |
intel | core_i7 | 8700k | |
intel | core_m | 5y10 | |
intel | core_m | 5y10a | |
intel | core_m | 5y10c | |
intel | core_m | 5y31 | |
intel | core_m | 5y51 | |
intel | core_m | 5y70 | |
intel | core_m | 5y71 | |
intel | core_m3 | 6y30 | |
intel | core_m3 | 7y30 | |
intel | core_m3 | 7y32 | |
intel | core_m5 | 6y54 | |
intel | core_m5 | 6y57 | |
intel | core_m7 | 6y75 | |
intel | pentium_j | j2850 | |
intel | pentium_j | j2900 | |
intel | pentium_j | j3710 | |
intel | pentium_j | j4205 | |
intel | pentium_n | n3510 | |
intel | pentium_n | n3520 | |
intel | pentium_n | n3530 | |
intel | pentium_n | n3540 | |
intel | pentium_n | n3700 | |
intel | pentium_n | n3710 | |
intel | pentium_n | n4200 | |
intel | xeon | e5502 | |
intel | xeon | e5503 | |
intel | xeon | e5504 | |
intel | xeon | e5506 | |
intel | xeon | e5507 | |
intel | xeon | e5520 | |
intel | xeon | e5530 | |
intel | xeon | e5540 | |
intel | xeon | e5603 | |
intel | xeon | e5606 | |
intel | xeon | e5607 | |
intel | xeon | e5620 | |
intel | xeon | e5630 | |
intel | xeon | e5640 | |
intel | xeon | e5645 | |
intel | xeon | e5649 | |
intel | xeon | e6510 | |
intel | xeon | e6540 | |
intel | xeon | e7520 | |
intel | xeon | e7530 | |
intel | xeon | e7540 | |
intel | xeon | ec5509 | |
intel | xeon | ec5539 | |
intel | xeon | ec5549 | |
intel | xeon | l3406 | |
intel | xeon | l3426 | |
intel | xeon | l5506 | |
intel | xeon | l5508 | |
intel | xeon | l5518 | |
intel | xeon | l5520 | |
intel | xeon | l5530 | |
intel | xeon | l5609 | |
intel | xeon | l5618 | |
intel | xeon | l5630 | |
intel | xeon | l5638 | |
intel | xeon | l5640 | |
intel | xeon | l7545 | |
intel | xeon | l7555 | |
intel | xeon | lc5518 | |
intel | xeon | lc5528 | |
intel | xeon | w3670 | |
intel | xeon | w3680 | |
intel | xeon | w3690 | |
intel | xeon | w5580 | |
intel | xeon | w5590 | |
intel | xeon | x3430 | |
intel | xeon | x3440 | |
intel | xeon | x3450 | |
intel | xeon | x3460 | |
intel | xeon | x3470 | |
intel | xeon | x3480 | |
intel | xeon | x5550 | |
intel | xeon | x5560 | |
intel | xeon | x5570 | |
intel | xeon | x5647 | |
intel | xeon | x5650 | |
intel | xeon | x5660 | |
intel | xeon | x5667 | |
intel | xeon | x5670 | |
intel | xeon | x5672 | |
intel | xeon | x5675 | |
intel | xeon | x5677 | |
intel | xeon | x5680 | |
intel | xeon | x5687 | |
intel | xeon | x5690 | |
intel | xeon | x6550 | |
intel | xeon | x7542 | |
intel | xeon | x7550 | |
intel | xeon | x7560 | |
intel | xeon_bronze_3104 | - | |
intel | xeon_bronze_3106 | - | |
intel | xeon_e-1105c | - | |
intel | xeon_e3 | 1505m_v6 | |
intel | xeon_e3 | 1515m_v5 | |
intel | xeon_e3 | 1535m_v5 | |
intel | xeon_e3 | 1535m_v6 | |
intel | xeon_e3 | 1545m_v5 | |
intel | xeon_e3 | 1558l_v5 | |
intel | xeon_e3 | 1565l_v5 | |
intel | xeon_e3 | 1575m_v5 | |
intel | xeon_e3 | 1578l_v5 | |
intel | xeon_e3 | 1585_v5 | |
intel | xeon_e3 | 1585l_v5 | |
intel | xeon_e3_1105c_v2 | - | |
intel | xeon_e3_1125c | - | |
intel | xeon_e3_1125c_v2 | - | |
intel | xeon_e3_1220 | - | |
intel | xeon_e3_1220_v2 | - | |
intel | xeon_e3_1220_v3 | - | |
intel | xeon_e3_1220_v5 | - | |
intel | xeon_e3_1220_v6 | - | |
intel | xeon_e3_12201 | - | |
intel | xeon_e3_12201_v2 | - | |
intel | xeon_e3_1220l_v3 | - | |
intel | xeon_e3_1225 | - | |
intel | xeon_e3_1225_v2 | - | |
intel | xeon_e3_1225_v3 | - | |
intel | xeon_e3_1225_v5 | - | |
intel | xeon_e3_1225_v6 | - | |
intel | xeon_e3_1226_v3 | - | |
intel | xeon_e3_1230 | - | |
intel | xeon_e3_1230_v2 | - | |
intel | xeon_e3_1230_v3 | - | |
intel | xeon_e3_1230_v5 | - | |
intel | xeon_e3_1230_v6 | - | |
intel | xeon_e3_1230l_v3 | - | |
intel | xeon_e3_1231_v3 | - | |
intel | xeon_e3_1235 | - | |
intel | xeon_e3_1235l_v5 | - | |
intel | xeon_e3_1240 | - | |
intel | xeon_e3_1240_v2 | - | |
intel | xeon_e3_1240_v3 | - | |
intel | xeon_e3_1240_v5 | - | |
intel | xeon_e3_1240_v6 | - | |
intel | xeon_e3_1240l_v3 | - | |
intel | xeon_e3_1240l_v5 | - | |
intel | xeon_e3_1241_v3 | - | |
intel | xeon_e3_1245 | - | |
intel | xeon_e3_1245_v2 | - | |
intel | xeon_e3_1245_v3 | - | |
intel | xeon_e3_1245_v5 | - | |
intel | xeon_e3_1245_v6 | - | |
intel | xeon_e3_1246_v3 | - | |
intel | xeon_e3_1258l_v4 | - | |
intel | xeon_e3_1260l | - | |
intel | xeon_e3_1260l_v5 | - | |
intel | xeon_e3_1265l_v2 | - | |
intel | xeon_e3_1265l_v3 | - | |
intel | xeon_e3_1265l_v4 | - | |
intel | xeon_e3_1268l_v3 | - | |
intel | xeon_e3_1268l_v5 | - | |
intel | xeon_e3_1270 | - | |
intel | xeon_e3_1270_v2 | - | |
intel | xeon_e3_1270_v3 | - | |
intel | xeon_e3_1270_v5 | - | |
intel | xeon_e3_1270_v6 | - | |
intel | xeon_e3_1271_v3 | - | |
intel | xeon_e3_1275 | - | |
intel | xeon_e3_1275_v2 | - | |
intel | xeon_e3_1275_v3 | - | |
intel | xeon_e3_1275_v5 | - | |
intel | xeon_e3_1275_v6 | - | |
intel | xeon_e3_1275l_v3 | - | |
intel | xeon_e3_1276_v3 | - | |
intel | xeon_e3_1278l_v4 | - | |
intel | xeon_e3_1280 | - | |
intel | xeon_e3_1280_v2 | - | |
intel | xeon_e3_1280_v3 | - | |
intel | xeon_e3_1280_v5 | - | |
intel | xeon_e3_1280_v6 | - | |
intel | xeon_e3_1281_v3 | - | |
intel | xeon_e3_1285_v3 | - | |
intel | xeon_e3_1285_v4 | - | |
intel | xeon_e3_1285_v6 | - | |
intel | xeon_e3_1285l_v3 | - | |
intel | xeon_e3_1285l_v4 | - | |
intel | xeon_e3_1286_v3 | - | |
intel | xeon_e3_1286l_v3 | - | |
intel | xeon_e3_1290 | - | |
intel | xeon_e3_1290_v2 | - | |
intel | xeon_e3_1501l_v6 | - | |
intel | xeon_e3_1501m_v6 | - | |
intel | xeon_e3_1505l_v5 | - | |
intel | xeon_e3_1505l_v6 | - | |
intel | xeon_e3_1505m_v5 | - | |
intel | xeon_e5 | 2650l_v4 | |
intel | xeon_e5 | 2658 | |
intel | xeon_e5 | 2658_v2 | |
intel | xeon_e5 | 2658_v3 | |
intel | xeon_e5 | 2658_v4 | |
intel | xeon_e5 | 2658a_v3 | |
intel | xeon_e5 | 2660 | |
intel | xeon_e5 | 2660_v2 | |
intel | xeon_e5 | 2660_v3 | |
intel | xeon_e5 | 2660_v4 | |
intel | xeon_e5 | 2665 | |
intel | xeon_e5 | 2667 | |
intel | xeon_e5 | 2667_v2 | |
intel | xeon_e5 | 2667_v3 | |
intel | xeon_e5 | 2667_v4 | |
intel | xeon_e5 | 2670 | |
intel | xeon_e5 | 2670_v2 | |
intel | xeon_e5 | 2670_v3 | |
intel | xeon_e5 | 2680 | |
intel | xeon_e5 | 2680_v2 | |
intel | xeon_e5 | 2680_v3 | |
intel | xeon_e5 | 2680_v4 | |
intel | xeon_e5 | 2683_v3 | |
intel | xeon_e5 | 2683_v4 | |
intel | xeon_e5 | 2687w | |
intel | xeon_e5 | 2687w_v2 | |
intel | xeon_e5 | 2687w_v3 | |
intel | xeon_e5 | 2687w_v4 | |
intel | xeon_e5 | 2690 | |
intel | xeon_e5 | 2690_v2 | |
intel | xeon_e5 | 2690_v3 | |
intel | xeon_e5 | 2690_v4 | |
intel | xeon_e5 | 2695_v2 | |
intel | xeon_e5 | 2695_v3 | |
intel | xeon_e5 | 2695_v4 | |
intel | xeon_e5 | 2697_v2 | |
intel | xeon_e5 | 2697_v3 | |
intel | xeon_e5 | 2697_v4 | |
intel | xeon_e5 | 2697a_v4 | |
intel | xeon_e5 | 2698_v3 | |
intel | xeon_e5 | 2698_v4 | |
intel | xeon_e5 | 2699_v3 | |
intel | xeon_e5 | 2699_v4 | |
intel | xeon_e5 | 2699a_v4 | |
intel | xeon_e5 | 2699r_v4 | |
intel | xeon_e5 | 4603 | |
intel | xeon_e5 | 4603_v2 | |
intel | xeon_e5 | 4607 | |
intel | xeon_e5 | 4607_v2 | |
intel | xeon_e5 | 4610 | |
intel | xeon_e5 | 4610_v2 | |
intel | xeon_e5 | 4610_v3 | |
intel | xeon_e5 | 4610_v4 | |
intel | xeon_e5 | 4617 | |
intel | xeon_e5 | 4620 | |
intel | xeon_e5 | 4620_v2 | |
intel | xeon_e5 | 4620_v3 | |
intel | xeon_e5 | 4620_v4 | |
intel | xeon_e5 | 4624l_v2 | |
intel | xeon_e5 | 4627_v2 | |
intel | xeon_e5 | 4627_v3 | |
intel | xeon_e5 | 4627_v4 | |
intel | xeon_e5 | 4628l_v4 | |
intel | xeon_e5 | 4640 | |
intel | xeon_e5 | 4640_v2 | |
intel | xeon_e5 | 4640_v3 | |
intel | xeon_e5 | 4640_v4 | |
intel | xeon_e5 | 4648_v3 | |
intel | xeon_e5 | 4650 | |
intel | xeon_e5 | 4650_v2 | |
intel | xeon_e5 | 4650_v3 | |
intel | xeon_e5 | 4650_v4 | |
intel | xeon_e5 | 4650l | |
intel | xeon_e5 | 4655_v3 | |
intel | xeon_e5 | 4655_v4 | |
intel | xeon_e5 | 4657l_v2 | |
intel | xeon_e5 | 4660_v3 | |
intel | xeon_e5 | 4660_v4 | |
intel | xeon_e5 | 4667_v3 | |
intel | xeon_e5 | 4667_v4 | |
intel | xeon_e5 | 4669_v3 | |
intel | xeon_e5 | 4669_v4 | |
intel | xeon_e5_1428l | - | |
intel | xeon_e5_1428l_v2 | - | |
intel | xeon_e5_1428l_v3 | - | |
intel | xeon_e5_1620 | - | |
intel | xeon_e5_1620_v2 | - | |
intel | xeon_e5_1620_v3 | - | |
intel | xeon_e5_1620_v4 | - | |
intel | xeon_e5_1630_v3 | - | |
intel | xeon_e5_1630_v4 | - | |
intel | xeon_e5_1650 | - | |
intel | xeon_e5_1650_v2 | - | |
intel | xeon_e5_1650_v3 | - | |
intel | xeon_e5_1650_v4 | - | |
intel | xeon_e5_1660 | - | |
intel | xeon_e5_1660_v2 | - | |
intel | xeon_e5_1660_v3 | - | |
intel | xeon_e5_1660_v4 | - | |
intel | xeon_e5_1680_v3 | - | |
intel | xeon_e5_1680_v4 | - | |
intel | xeon_e5_2403 | - | |
intel | xeon_e5_2403_v2 | - | |
intel | xeon_e5_2407 | - | |
intel | xeon_e5_2407_v2 | - | |
intel | xeon_e5_2408l_v3 | - | |
intel | xeon_e5_2418l | - | |
intel | xeon_e5_2418l_v2 | - | |
intel | xeon_e5_2418l_v3 | - | |
intel | xeon_e5_2420 | - | |
intel | xeon_e5_2420_v2 | - | |
intel | xeon_e5_2428l | - | |
intel | xeon_e5_2428l_v2 | - | |
intel | xeon_e5_2428l_v3 | - | |
intel | xeon_e5_2430 | - | |
intel | xeon_e5_2430_v2 | - | |
intel | xeon_e5_2430l | - | |
intel | xeon_e5_2430l_v2 | - | |
intel | xeon_e5_2438l_v3 | - | |
intel | xeon_e5_2440 | - | |
intel | xeon_e5_2440_v2 | - | |
intel | xeon_e5_2448l | - | |
intel | xeon_e5_2448l_v2 | - | |
intel | xeon_e5_2450 | - | |
intel | xeon_e5_2450_v2 | - | |
intel | xeon_e5_2450l | - | |
intel | xeon_e5_2450l_v2 | - | |
intel | xeon_e5_2470 | - | |
intel | xeon_e5_2470_v2 | - | |
intel | xeon_e5_2603 | - | |
intel | xeon_e5_2603_v2 | - | |
intel | xeon_e5_2603_v3 | - | |
intel | xeon_e5_2603_v4 | - | |
intel | xeon_e5_2608l_v3 | - | |
intel | xeon_e5_2608l_v4 | - | |
intel | xeon_e5_2609 | - | |
intel | xeon_e5_2609_v2 | - | |
intel | xeon_e5_2609_v3 | - | |
intel | xeon_e5_2609_v4 | - | |
intel | xeon_e5_2618l_v2 | - | |
intel | xeon_e5_2618l_v3 | - | |
intel | xeon_e5_2618l_v4 | - | |
intel | xeon_e5_2620 | - | |
intel | xeon_e5_2620_v2 | - | |
intel | xeon_e5_2620_v3 | - | |
intel | xeon_e5_2620_v4 | - | |
intel | xeon_e5_2623_v3 | - | |
intel | xeon_e5_2623_v4 | - | |
intel | xeon_e5_2628l_v2 | - | |
intel | xeon_e5_2628l_v3 | - | |
intel | xeon_e5_2628l_v4 | - | |
intel | xeon_e5_2630 | - | |
intel | xeon_e5_2630_v2 | - | |
intel | xeon_e5_2630_v3 | - | |
intel | xeon_e5_2630_v4 | - | |
intel | xeon_e5_2630l | - | |
intel | xeon_e5_2630l_v2 | - | |
intel | xeon_e5_2630l_v3 | - | |
intel | xeon_e5_2630l_v4 | - | |
intel | xeon_e5_2637 | - | |
intel | xeon_e5_2637_v2 | - | |
intel | xeon_e5_2637_v3 | - | |
intel | xeon_e5_2637_v4 | - | |
intel | xeon_e5_2640 | - | |
intel | xeon_e5_2640_v2 | - | |
intel | xeon_e5_2640_v3 | - | |
intel | xeon_e5_2640_v4 | - | |
intel | xeon_e5_2643 | - | |
intel | xeon_e5_2643_v2 | - | |
intel | xeon_e5_2643_v3 | - | |
intel | xeon_e5_2643_v4 | - | |
intel | xeon_e5_2648l | - | |
intel | xeon_e5_2648l_v2 | - | |
intel | xeon_e5_2648l_v3 | - | |
intel | xeon_e5_2648l_v4 | - | |
intel | xeon_e5_2650 | - | |
intel | xeon_e5_2650_v2 | - | |
intel | xeon_e5_2650_v3 | - | |
intel | xeon_e5_2650_v4 | - | |
intel | xeon_e5_2650l | - | |
intel | xeon_e5_2650l_v2 | - | |
intel | xeon_e5_2650l_v3 | - | |
intel | xeon_e7 | 2803 | |
intel | xeon_e7 | 2820 | |
intel | xeon_e7 | 2830 | |
intel | xeon_e7 | 2850 | |
intel | xeon_e7 | 2850_v2 | |
intel | xeon_e7 | 2860 | |
intel | xeon_e7 | 2870 | |
intel | xeon_e7 | 2870_v2 | |
intel | xeon_e7 | 2880_v2 | |
intel | xeon_e7 | 2890_v2 | |
intel | xeon_e7 | 4807 | |
intel | xeon_e7 | 4809_v2 | |
intel | xeon_e7 | 4809_v3 | |
intel | xeon_e7 | 4809_v4 | |
intel | xeon_e7 | 4820 | |
intel | xeon_e7 | 4820_v2 | |
intel | xeon_e7 | 4820_v3 | |
intel | xeon_e7 | 4820_v4 | |
intel | xeon_e7 | 4830 | |
intel | xeon_e7 | 4830_v2 | |
intel | xeon_e7 | 4830_v3 | |
intel | xeon_e7 | 4830_v4 | |
intel | xeon_e7 | 4850 | |
intel | xeon_e7 | 4850_v2 | |
intel | xeon_e7 | 4850_v3 | |
intel | xeon_e7 | 4850_v4 | |
intel | xeon_e7 | 4860 | |
intel | xeon_e7 | 4860_v2 | |
intel | xeon_e7 | 4870 | |
intel | xeon_e7 | 4870_v2 | |
intel | xeon_e7 | 4880_v2 | |
intel | xeon_e7 | 4890_v2 | |
intel | xeon_e7 | 8830 | |
intel | xeon_e7 | 8837 | |
intel | xeon_e7 | 8850 | |
intel | xeon_e7 | 8850_v2 | |
intel | xeon_e7 | 8857_v2 | |
intel | xeon_e7 | 8860 | |
intel | xeon_e7 | 8860_v3 | |
intel | xeon_e7 | 8860_v4 | |
intel | xeon_e7 | 8867_v3 | |
intel | xeon_e7 | 8867_v4 | |
intel | xeon_e7 | 8867l | |
intel | xeon_e7 | 8870 | |
intel | xeon_e7 | 8870_v2 | |
intel | xeon_e7 | 8870_v3 | |
intel | xeon_e7 | 8870_v4 | |
intel | xeon_e7 | 8880_v2 | |
intel | xeon_e7 | 8880_v3 | |
intel | xeon_e7 | 8880_v4 | |
intel | xeon_e7 | 8880l_v2 | |
intel | xeon_e7 | 8880l_v3 | |
intel | xeon_e7 | 8890_v2 | |
intel | xeon_e7 | 8890_v3 | |
intel | xeon_e7 | 8890_v4 | |
intel | xeon_e7 | 8891_v2 | |
intel | xeon_e7 | 8891_v3 | |
intel | xeon_e7 | 8891_v4 | |
intel | xeon_e7 | 8893_v2 | |
intel | xeon_e7 | 8893_v3 | |
intel | xeon_e7 | 8893_v4 | |
intel | xeon_e7 | 8894_v4 | |
intel | xeon_gold | 5115 | |
intel | xeon_gold | 5118 | |
intel | xeon_gold | 5119t | |
intel | xeon_gold | 5120 | |
intel | xeon_gold | 5120t | |
intel | xeon_gold | 5122 | |
intel | xeon_gold | 6126 | |
intel | xeon_gold | 6126f | |
intel | xeon_gold | 6126t | |
intel | xeon_gold | 6128 | |
intel | xeon_gold | 6130 | |
intel | xeon_gold | 6130f | |
intel | xeon_gold | 6130t | |
intel | xeon_gold | 6132 | |
intel | xeon_gold | 6134 | |
intel | xeon_gold | 6134m | |
intel | xeon_gold | 6136 | |
intel | xeon_gold | 6138 | |
intel | xeon_gold | 6138f | |
intel | xeon_gold | 6138t | |
intel | xeon_gold | 6140 | |
intel | xeon_gold | 6140m | |
intel | xeon_gold | 6142 | |
intel | xeon_gold | 6142f | |
intel | xeon_gold | 6142m | |
intel | xeon_gold | 6144 | |
intel | xeon_gold | 6146 | |
intel | xeon_gold | 6148 | |
intel | xeon_gold | 6148f | |
intel | xeon_gold | 6150 | |
intel | xeon_gold | 6152 | |
intel | xeon_gold | 6154 | |
intel | xeon_phi | 7210 | |
intel | xeon_phi | 7210f | |
intel | xeon_phi | 7230 | |
intel | xeon_phi | 7230f | |
intel | xeon_phi | 7235 | |
intel | xeon_phi | 7250 | |
intel | xeon_phi | 7250f | |
intel | xeon_phi | 7285 | |
intel | xeon_phi | 7290 | |
intel | xeon_phi | 7290f | |
intel | xeon_phi | 7295 | |
intel | xeon_platinum | 8153 | |
intel | xeon_platinum | 8156 | |
intel | xeon_platinum | 8158 | |
intel | xeon_platinum | 8160 | |
intel | xeon_platinum | 8160f | |
intel | xeon_platinum | 8160m | |
intel | xeon_platinum | 8160t | |
intel | xeon_platinum | 8164 | |
intel | xeon_platinum | 8168 | |
intel | xeon_platinum | 8170 | |
intel | xeon_platinum | 8170m | |
intel | xeon_platinum | 8176 | |
intel | xeon_platinum | 8176f | |
intel | xeon_platinum | 8176m | |
intel | xeon_platinum | 8180 | |
intel | xeon_silver | 4108 | |
intel | xeon_silver | 4109t | |
intel | xeon_silver | 4110 | |
intel | xeon_silver | 4112 | |
intel | xeon_silver | 4114 | |
intel | xeon_silver | 4114t | |
intel | xeon_silver | 4116 | |
intel | xeon_silver | 4116t | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.04 | |
canonical | ubuntu_linux | 17.10 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
oracle | local_service_management_system | 13.1 | |
oracle | local_service_management_system | 13.2 | |
oracle | local_service_management_system | 13.3 | |
oracle | solaris | 10 | |
oracle | solaris | 11.3 | |
synology | router_manager | * | |
synology | skynas | - | |
synology | virtual_machine_manager | * | |
synology | diskstation_manager | * | |
synology | vs960hd_firmware | - | |
synology | vs960hd | - | |
synology | vs360hd_firmware | - | |
synology | vs360hd | - | |
opensuse | leap | 42.2 | |
opensuse | leap | 42.3 | |
suse | suse_linux_enterprise_desktop | 12 | |
suse | suse_linux_enterprise_desktop | 12 | |
suse | suse_linux_enterprise_server | 11 | |
suse | suse_linux_enterprise_server | 12 | |
suse | suse_linux_enterprise_server | 12 | |
suse | suse_linux_enterprise_server | 12 | |
suse | suse_linux_enterprise_software_development_kit | 11 | |
suse | suse_linux_enterprise_software_development_kit | 12 | |
suse | suse_linux_enterprise_software_development_kit | 12 | |
arm | cortex-r7_firmware | - | |
arm | cortex-r7 | - | |
arm | cortex-r8_firmware | - | |
arm | cortex-r8 | - | |
arm | cortex-a8_firmware | - | |
arm | cortex-a8 | - | |
arm | cortex-a9_firmware | - | |
arm | cortex-a9 | - | |
arm | cortex-a12_firmware | - | |
arm | cortex-a12 | - | |
arm | cortex-a15_firmware | - | |
arm | cortex-a15 | - | |
arm | cortex-a17_firmware | - | |
arm | cortex-a17 | - | |
arm | cortex-a57_firmware | - | |
arm | cortex-a57 | - | |
arm | cortex-a72_firmware | - | |
arm | cortex-a72 | - | |
arm | cortex-a73_firmware | - | |
arm | cortex-a73 | - | |
arm | cortex-a75_firmware | - | |
arm | cortex-a75 | - | |
arm | cortex-a76_firmware | - | |
arm | cortex-a76 | - | |
pepperl-fuchs | visunet_rm_shell | - | |
pepperl-fuchs | btc12_firmware | - | |
pepperl-fuchs | btc12 | - | |
pepperl-fuchs | btc14_firmware | - | |
pepperl-fuchs | btc14 | - | |
netapp | hci | - | |
netapp | solidfire | - | |
phoenixcontact | bl_ppc_1000_firmware | - | |
phoenixcontact | bl_ppc_1000 | - | |
phoenixcontact | bl_ppc12_1000_firmware | - | |
phoenixcontact | bl_ppc12_1000 | - | |
phoenixcontact | bl_ppc15_1000_firmware | - | |
phoenixcontact | bl_ppc15_1000 | - | |
phoenixcontact | bl_ppc17_1000_firmware | - | |
phoenixcontact | bl_ppc17_1000 | - | |
phoenixcontact | bl_bpc_2000_firmware | - | |
phoenixcontact | bl_bpc_2000 | - | |
phoenixcontact | bl_bpc_2001_firmware | - | |
phoenixcontact | bl_bpc_2001 | - | |
phoenixcontact | bl_bpc_3000_firmware | - | |
phoenixcontact | bl_bpc_3000 | - | |
phoenixcontact | bl_bpc_3001_firmware | - | |
phoenixcontact | bl_bpc_3001 | - | |
phoenixcontact | bl_ppc15_3000_firmware | - | |
phoenixcontact | bl_ppc15_3000 | - | |
phoenixcontact | bl_ppc17_3000_firmware | - | |
phoenixcontact | bl_ppc17_3000 | - | |
phoenixcontact | bl_bpc_7000_firmware | - | |
phoenixcontact | bl_bpc_7000 | - | |
phoenixcontact | bl_bpc_7001_firmware | - | |
phoenixcontact | bl_bpc_7001 | - | |
phoenixcontact | bl_ppc_7000_firmware | - | |
phoenixcontact | bl_ppc_7000 | - | |
phoenixcontact | bl_ppc15_7000_firmware | - | |
phoenixcontact | bl_ppc15_7000 | - | |
phoenixcontact | bl_ppc17_7000_firmware | - | |
phoenixcontact | bl_ppc17_7000 | - | |
phoenixcontact | bl_rackmount_2u_firmware | - | |
phoenixcontact | bl_rackmount_2u | - | |
phoenixcontact | bl_rackmount_4u_firmware | - | |
phoenixcontact | bl_rackmount_4u | - | |
phoenixcontact | bl2_bpc_1000_firmware | - | |
phoenixcontact | bl2_bpc_1000 | - | |
phoenixcontact | bl2_ppc_1000_firmware | - | |
phoenixcontact | bl2_ppc_1000 | - | |
phoenixcontact | bl2_bpc_2000_firmware | - | |
phoenixcontact | bl2_bpc_2000 | - | |
phoenixcontact | bl2_ppc_2000_firmware | - | |
phoenixcontact | bl2_ppc_2000 | - | |
phoenixcontact | bl2_bpc_7000_firmware | - | |
phoenixcontact | bl2_bpc_7000 | - | |
phoenixcontact | bl2_ppc_7000_firmware | - | |
phoenixcontact | bl2_ppc_7000 | - | |
phoenixcontact | dl_ppc15_1000_firmware | - | |
phoenixcontact | dl_ppc15_1000 | - | |
phoenixcontact | dl_ppc15m_7000_firmware | - | |
phoenixcontact | dl_ppc15m_7000 | - | |
phoenixcontact | dl_ppc18.5m_7000_firmware | - | |
phoenixcontact | dl_ppc18.5m_7000 | - | |
phoenixcontact | dl_ppc21.5m_7000_firmware | - | |
phoenixcontact | dl_ppc21.5m_7000 | - | |
phoenixcontact | el_ppc_1000_firmware | - | |
phoenixcontact | el_ppc_1000 | - | |
phoenixcontact | el_ppc_1000\/wt_firmware | - | |
phoenixcontact | el_ppc_1000\/wt | - | |
phoenixcontact | el_ppc_1000\/m_firmware | - | |
phoenixcontact | el_ppc_1000\/m | - | |
phoenixcontact | valueline_ipc_firmware | - | |
phoenixcontact | valueline_ipc | - | |
phoenixcontact | vl_bpc_1000_firmware | - | |
phoenixcontact | vl_bpc_1000 | - | |
phoenixcontact | vl_bpc_2000_firmware | - | |
phoenixcontact | vl_bpc_2000 | - | |
phoenixcontact | vl_ppc_2000_firmware | - | |
phoenixcontact | vl_ppc_2000 | - | |
phoenixcontact | vl_bpc_3000_firmware | - | |
phoenixcontact | vl_bpc_3000 | - | |
phoenixcontact | vl_ppc_3000_firmware | - | |
phoenixcontact | vl_ppc_3000 | - | |
phoenixcontact | vl_ipc_p7000_firmware | - | |
phoenixcontact | vl_ipc_p7000 | - | |
phoenixcontact | vl2_bpc_1000_firmware | - | |
phoenixcontact | vl2_bpc_1000 | - | |
phoenixcontact | vl2_ppc_1000_firmware | - | |
phoenixcontact | vl2_ppc_1000 | - | |
phoenixcontact | vl2_bpc_2000_firmware | - | |
phoenixcontact | vl2_bpc_2000 | - | |
phoenixcontact | vl2_ppc_2000_firmware | - | |
phoenixcontact | vl2_ppc_2000 | - | |
phoenixcontact | vl2_bpc_3000_firmware | - | |
phoenixcontact | vl2_bpc_3000 | - | |
phoenixcontact | vl2_ppc_3000_firmware | - | |
phoenixcontact | vl2_ppc_3000 | - | |
phoenixcontact | vl2_bpc_7000_firmware | - | |
phoenixcontact | vl2_bpc_7000 | - | |
phoenixcontact | vl2_ppc_7000_firmware | - | |
phoenixcontact | vl2_ppc_7000 | - | |
phoenixcontact | vl2_bpc_9000_firmware | - | |
phoenixcontact | vl2_bpc_9000 | - | |
phoenixcontact | vl2_ppc_9000_firmware | - | |
phoenixcontact | vl2_ppc_9000 | - | |
phoenixcontact | vl2_ppc7_1000_firmware | - | |
phoenixcontact | vl2_ppc7_1000 | - | |
phoenixcontact | vl2_ppc9_1000_firmware | - | |
phoenixcontact | vl2_ppc9_1000 | - | |
phoenixcontact | vl2_ppc12_1000_firmware | - | |
phoenixcontact | vl2_ppc12_1000 | - | |
siemens | simatic_itc1500_firmware | * | |
siemens | simatic_itc1500 | v3 | |
siemens | simatic_itc1500_pro_firmware | * | |
siemens | simatic_itc1500_pro | v3 | |
siemens | simatic_itc1900_firmware | * | |
siemens | simatic_itc1900 | v3 | |
siemens | simatic_itc1900_pro_firmware | * | |
siemens | simatic_itc1900_pro | v3 | |
siemens | simatic_itc2200_firmware | * | |
siemens | simatic_itc2200 | v3 | |
siemens | simatic_itc2200_pro_firmware | * | |
siemens | simatic_itc2200_pro | v3 | |
siemens | simatic_winac_rtx_\(f\)_2010_firmware | * | |
siemens | simatic_winac_rtx_\(f\)_2010_firmware | 2010 | |
siemens | simatic_winac_rtx_\(f\)_2010_firmware | 2010 | |
siemens | simatic_winac_rtx_\(f\)_2010_firmware | 2010 | |
siemens | simatic_winac_rtx_\(f\)_2010 | - | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 5.5.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
arm | cortex-a77_firmware | - | |
arm | cortex-a77 | - | |
arm | cortex-a78_firmware | - | |
arm | cortex-a78 | - | |
arm | cortex-a78ae_firmware | - | |
arm | cortex-a78ae | - | |
arm | neoverse_n1_firmware | - | |
arm | neoverse_n1 | - | |
arm | neoverse_n2_firmware | - | |
arm | neoverse_n2 | - | |
arm | cortex-x1_firmware | - | |
arm | cortex-x1 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "matchCriteriaId": "704FAA50-1B7D-4917-AC4A-4C58785340F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "matchCriteriaId": "5C6B95D3-75BD-4826-BFBE-9701CC0FF052", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "matchCriteriaId": "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "matchCriteriaId": "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "matchCriteriaId": "022F2CBE-EFB1-4962-AC91-D25AAB057DAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "matchCriteriaId": "69C05CD9-551B-46EE-85F8-D18FF878FE8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "matchCriteriaId": "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "matchCriteriaId": "3C38C609-242E-4923-A81F-DAFBE7B6A927", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "matchCriteriaId": "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "matchCriteriaId": "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "matchCriteriaId": "D7AC7C56-2205-4121-99E2-001A7488E0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "matchCriteriaId": "A1677313-FF8F-493B-9DA3-C78F87581A17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "matchCriteriaId": "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "matchCriteriaId": "85CA4444-5103-4451-8A7C-F6BBE714BBB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "matchCriteriaId": "FA1EB745-46D7-4088-93C6-E7156520B144", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "matchCriteriaId": "BAB245C8-9918-41A0-9DFB-A11E4185C87A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "matchCriteriaId": "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "matchCriteriaId": "F752A3C8-18ED-4765-B6EC-C664154EB701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "matchCriteriaId": "B4F31C3F-7C0D-4D95-B4B9-89FD38076913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "matchCriteriaId": "5BEEE36E-E735-4A33-80B7-9407D072F6BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "matchCriteriaId": "2CB3D3DE-21BE-40C7-A510-AC97C92390DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "matchCriteriaId": "0D9A9545-38A3-460D-AB1A-8B03BEB405A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "matchCriteriaId": "1860D932-777D-41F2-94A2-D14AB1494AA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "matchCriteriaId": "75165A10-2FD5-4370-814C-B60FDE339AFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "matchCriteriaId": "78E4461B-72F8-4F3D-A405-4AFA99EC8A32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "matchCriteriaId": "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "matchCriteriaId": "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "matchCriteriaId": "DAEDED56-9387-4DAC-BF52-C32ECCB7D407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "matchCriteriaId": "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "matchCriteriaId": "E57A9B28-734B-401D-B24C-A295F364D8E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "matchCriteriaId": "F02289DF-4A02-4602-89B7-E9148236EE1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "matchCriteriaId": "731F1E65-1D53-443B-8E2F-8AF11191AFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "matchCriteriaId": "02A83822-822D-4A4D-B29B-A5BE6367A7DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "matchCriteriaId": "E8C32738-F08E-469C-8DE0-2708F30574A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "matchCriteriaId": "B292187E-8EAD-49D2-B469-B14CA0656035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "matchCriteriaId": "C7D131E1-24C1-48CF-B3DD-46B09A718FB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "matchCriteriaId": "0ABF1231-73CF-4D1B-860C-E76CD26A645E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "matchCriteriaId": "F7F88E38-4EC4-41DB-A59D-800997440C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "matchCriteriaId": "32FD6647-4101-4B36-9A9A-F70C29997148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "matchCriteriaId": "D248D668-A895-43B3-ADEF-1B22EE7DC76E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "matchCriteriaId": "858411B5-E904-45FA-8B33-5CC73B915B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "matchCriteriaId": "6BB9336C-C893-4AB0-9402-868CE9960058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "matchCriteriaId": "A4695F94-7AAE-4219-9EF6-CE6D0838192D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A0991-73F0-410D-855C-BFC88A66E61F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "matchCriteriaId": "9858EAC3-C1CE-449B-A605-FFA337DA825D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "matchCriteriaId": "E7A8F905-A4C6-4EC6-B9E8-800948350B89", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "matchCriteriaId": "565B48E3-1406-4E3C-B4A5-35865C5614E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "matchCriteriaId": "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "matchCriteriaId": "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "matchCriteriaId": "191A094B-E354-4767-AD43-87CE140BF851", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "238A21CB-F8C5-468B-B523-6D014E2EA8AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "matchCriteriaId": "A3A630E1-6CAE-4809-AB18-5002F158AE90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "matchCriteriaId": "A67750FF-EF4B-414F-8ED4-299CAF33B0DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "matchCriteriaId": "5A82D885-82F5-4755-BC11-5899E28CEE42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "matchCriteriaId": "7FD75301-E29C-47DC-B53F-DC44EA0C1885", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "matchCriteriaId": "8C944024-BEAA-43AF-A339-FD69C75E8240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "matchCriteriaId": "435C69D1-3932-4379-8D18-B1E12D558325", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "matchCriteriaId": "3572B700-73C0-41D1-95FD-FE9D5B0C1F80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "matchCriteriaId": "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "matchCriteriaId": "16FB3E4B-05F8-411A-8C86-4ACE03815553", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "8E55EBC1-6F96-47CD-9503-7855EFB07240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "A1789924-FADB-4076-8874-120B29EE6B86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "BC246667-2F6F-4024-9EAA-2CE3018235C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "1341A5D4-A5CE-4D31-A178-01C3069D7A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "86A5C199-92E5-435C-AC40-175849285104", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "67589F54-0A54-4DE7-9A47-A73DD05F7965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "matchCriteriaId": "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "matchCriteriaId": "92C5DC8C-3318-440B-8B29-4827F343927B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "matchCriteriaId": "0ECC47D8-F602-4CEA-B19A-209CE76C9D36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "matchCriteriaId": "7514ADD3-DECC-4CC2-9421-A609E526FDC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "matchCriteriaId": "691097C3-F91B-499B-BAEB-4E7E9C43B517", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "matchCriteriaId": "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "19A49AAF-0F08-4151-8F74-4EF9C3415B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "3F7A2018-BB4D-4DC1-813D-A4AA3F270893", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "matchCriteriaId": "A95D91C4-C539-4458-A6C9-8AE17207AE30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "matchCriteriaId": "37F9D218-8198-42C7-88FE-7C5382138324", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "matchCriteriaId": "CF8FDD81-95EE-4241-93C8-925085A4CE7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "matchCriteriaId": "614D9E35-10E0-4CCB-B817-C7C8C3947BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "matchCriteriaId": "F75F987E-F4DB-46FF-B048-21B4A4C07B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "matchCriteriaId": "05376F2C-30B6-406D-90F7-6C2E00E85171", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "CCDD3DF6-24BF-4C13-8F07-AF07327E5622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "B1520A64-2157-45D7-A135-F900798C4EB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "05A30F85-5367-4369-B7A5-176D71279FC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "matchCriteriaId": "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "matchCriteriaId": "1DC63B6B-5D6D-477B-9125-007F835981B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "BF385AC9-963E-4670-95A6-BE1EBC3890B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "943FA088-2902-45A9-A1BA-D612B46A50D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "matchCriteriaId": "8C80902D-9A6C-47D4-B56F-35C378FC0E63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "matchCriteriaId": "1100B46C-8485-4048-BFF8-2BAB311EC04A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E1646-E154-41BA-B9FA-0839A898023D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "matchCriteriaId": "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "matchCriteriaId": "31C10985-CBF7-4717-A7D6-2594887D7CB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "matchCriteriaId": "8C49886C-B6A0-4D95-8533-329FE5A66F6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "matchCriteriaId": "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "matchCriteriaId": "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "matchCriteriaId": "8C6E420E-16DA-4FB1-9968-C93E229614FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "matchCriteriaId": "07469E04-B3D2-41FE-A2E4-E25A977026CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "matchCriteriaId": "60FF402E-5E4F-414A-A3AB-149548303616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "matchCriteriaId": "79E2B875-A270-45C0-A1B1-041264E5B290", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "8C828C8C-7ECB-4167-87A9-0F522C400C66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "0C2C887F-1EF7-468A-A6AE-440793C78DAC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F3D7F-D884-4ACD-A103-060F57A9867B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "BD1FCAAD-7072-45EC-9ACB-08556458BAF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "C4446224-40E8-4AD0-8197-921D3473E19B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "B92B68FD-771A-4401-8B1D-B1A252356F62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "36F737C1-6011-42D2-9690-CA81EA0A283C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "matchCriteriaId": "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "matchCriteriaId": "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "matchCriteriaId": "56C909B0-8FB2-4220-AF93-EECB8D650CC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "matchCriteriaId": "FF36BAD0-A762-4F84-BE0B-060FE666ED67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "matchCriteriaId": "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "matchCriteriaId": "BCDFA137-F1FC-46BD-9872-D62671B1434D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "matchCriteriaId": "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "matchCriteriaId": "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "matchCriteriaId": "E2C67312-E128-4833-A91E-D7A9F96A7AD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "matchCriteriaId": "3F19F408-FABD-4A68-8CDC-C763F0321FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "matchCriteriaId": "68A06EC2-E491-4CD5-9904-61A88EBB7FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "matchCriteriaId": "789A8CAE-8D9E-4244-880D-FBE28EC53AED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "matchCriteriaId": "F901EE11-D0C9-46F6-8316-D8F4F1D50260", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "matchCriteriaId": "E549F600-B9CE-4843-A772-2DACC528903E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "matchCriteriaId": "3F28E733-87ED-4610-A8EE-BD37BED7685B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F98247B-1839-4676-855B-827A4B6C016B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6CEEEE2-D6A2-4342-8A73-934093948824", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86616FE-0C3F-4984-A364-8A6A9F01DAD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "matchCriteriaId": "F6E468FE-73BE-4B20-B774-58EC7CD20CDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6B19B-7D45-44B3-8524-407253B93EEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "matchCriteriaId": "2B803FAD-E54D-49FE-A078-029B8FFBBB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "matchCriteriaId": "CC511505-ED67-45B4-B76C-56AB750C4408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "matchCriteriaId": "A430C232-79EB-4264-AE24-41D4A2A5D990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "matchCriteriaId": "3A9E3D4B-A3DF-4858-8C64-0316B6E57435", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "matchCriteriaId": "19108672-E1AA-41CC-B86C-061D3721C8B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "matchCriteriaId": "200D36CF-AEDE-4183-8C54-748E6E5A3218", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "matchCriteriaId": "4CF13A44-5163-4282-8EE8-7DC05499B5E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "matchCriteriaId": "827C12CE-D87D-489D-ABA7-BE0405EC33D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "matchCriteriaId": "16AA78F7-520B-4FFC-838C-DC74FEE8E13F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "668E2252-2290-41B5-95AB-95FB6092FF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBD9A6A2-3AE0-46A5-A953-1ADC280C16E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "7511381A-142F-4EC4-9399-86BA8218A6AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "521AB96C-3C60-44E1-935E-C6037343A3DC", "versionEndExcluding": "1.1.7-6941-1", "versionStartIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F53AB67-1CFA-467B-B2B1-D2447886FECE", "versionEndExcluding": "6.2-23739", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FB76C76-94F1-4109-9BA0-2390112816B3", "versionEndExcluding": "6.2.2-24922", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "66FC24F8-1B82-40EC-856A-2EA1736FFE5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8E2100A-F6C2-4B86-A4D0-08D998BEC86B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "3C04C1B2-B0C7-402D-B79E-B0157E011B28", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*", "matchCriteriaId": "E6334AF0-79FD-444D-BD41-DC8BF90A4109", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "41E76620-EC14-4D2B-828F-53F26DEA5DDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "5A7ED7DD-A7D2-4A71-8415-26103530AB2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*", "matchCriteriaId": "CE80FF2C-0075-4F00-938F-C2C267E950D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*", "matchCriteriaId": "CEF98D6C-3C80-4A42-B14B-22D69BC1F4C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "50E90625-DEB3-49D3-89B6-E9EEFFABD975", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*", "matchCriteriaId": "6E24E90D-6E89-439A-8418-440910C3F07C", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*", "matchCriteriaId": "33AFC27C-16AF-4742-9891-2240A73C6602", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93C10475-AE35-4134-BB87-45544A62C942", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*", "matchCriteriaId": "044039A3-2AC7-4685-B671-C9B9FFD4ED6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "477B6938-2314-487E-BB35-354B335AC642", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2F2C6D-3F41-4C42-81E2-01A52AD035B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D44EBD85-6140-41CD-8D26-29554CD2FBA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*", "matchCriteriaId": "87BC54A8-6CF9-453F-9008-72CBA8C62BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17DD7CB1-76E8-41C3-86B8-E43ECBB5E6CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*", "matchCriteriaId": "4437E468-F93D-4CE3-A156-06F631030A41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03311F2A-30E6-474E-824A-281ED3DE86AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*", "matchCriteriaId": "40B4D5CE-8DC1-4300-BCF0-71CFB4331B71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23EADA1F-73E8-4E70-AF90-CE8D26552687", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FDE279-49C3-452A-B9B0-36199C221F95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D591F3BE-13BB-4006-BE46-E975779DE5E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D90DFDC-0B90-4431-9A23-194A5BC651F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68D895EC-B0A9-4292-AC64-60673F72C765", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*", "matchCriteriaId": "B00CD88D-5649-403F-A55A-BD49427D30FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38768B2B-F1A3-4A76-8716-9520CA075F3D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*", "matchCriteriaId": "16E23102-964E-485D-8EFF-4B1BBFE6EDE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7173A6DC-4D4E-424C-A922-C16D67627834", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B1374D-59E8-4FE5-AC6C-0323AB1DD60D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A891447-2F1D-48B4-AA47-3CB7EA4FDC7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C1DF922-1F46-41A6-A367-E56DD8C4163D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08CC4E5E-2794-4893-9B45-E14A3F4CF159", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E4FCA77-71D3-495E-BA2A-2953369E5DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*", "matchCriteriaId": "F926EFFA-6C44-4D99-B1EB-C9EAB63B6768", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1F44360-2B5D-4154-9D58-8ACEEF99DF15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*", "matchCriteriaId": "1574ACD1-F5EC-47C9-97C5-A456E2C1D7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DD89499-E4BE-4ACD-878C-06EB2BD59FC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*", "matchCriteriaId": "9111BA3B-6A12-4974-9B94-548F6968BB8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAAE5EC4-9BB6-42EB-9B20-9CC3FADB1C8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D74B2ACC-6043-40F3-AAEC-BAEC804C7C65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE50478-AEA1-4DE3-9032-289DC6955634", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EDAE7D8-7902-46C6-AE2B-8AA76E84417F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5D8E919-CFBD-466A-A519-9B509A4E3663", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA09162-3331-49F6-A183-DDBE51C7F0FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB43A6C2-20DD-437D-AE6C-00A20C760CFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F230367-F012-459C-AA19-38B2856C12A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C44C9C-BA5D-42DD-968C-7D75795A1ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F51A0C40-1A6E-4955-A498-F94EBDCCE0A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91424832-CC0F-454D-A77B-3D438D17CAB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9544FE3-45A5-4803-A682-305C7BE488E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2498F2D-5A4B-4893-84E3-1144C6A16F01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE01550-016B-4BBA-9E56-FC18F0D52C82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B39DD6E-EB5B-46AE-9F7E-C3AB8744DC33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA86326-3959-40AE-8984-F01B6C49C846", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34215265-15D4-4662-9D8A-20E8F48560BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE66F952-2BDD-4700-AA3B-6CEF7EFBA4F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6EF7D36-9416-4634-AC9F-4115560E450F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A4D7BA0-3715-4E91-A63F-AEA251BA35F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F9519E-5640-45EF-8D4D-65E81797B967", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E5A7C1F-3F46-4374-9F62-DC7B28020D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "236A1006-7E56-4D2A-A9AF-C11E98EFBA56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ED51E38-43DC-4214-8011-A223D6C03486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9901BBE2-F9C3-4F5E-82FF-9C84691BF148", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E67487D-73DA-4105-B4F8-41A1D54640DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "772FFDA5-B054-4F97-A399-9A8E4B4830FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF2DB741-F0D0-4607-A40B-4A9BB97231BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B647A88-B245-4796-BE42-EEE78D06F500", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "3622D879-BA40-48B1-89D5-608AA99333A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "624F92AA-903D-4ADC-83BE-35B4EAE7F740", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*", "matchCriteriaId": "783D5428-AC98-4C58-AD6F-0D518B695529", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69097B1F-C3EC-42FA-8C69-32D9DC430611", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3F1000E-ECF5-4952-BE18-53DEB7BA8135", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12165D80-E3BA-4254-A3C0-F9785ECEE6A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8631B12E-CE9A-41D2-BE3E-1C2FAF513468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2378F6D3-FF9D-45AD-932C-9ED4B3FE8CFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF9E21E1-C9C6-4790-9C8F-153A0AA2120C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F999652C-BCCA-4EFC-B859-4D6D995267D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA4BAB42-0A0A-480D-9DF2-7E99E45A12E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F3E671-D5BC-4FDC-9878-A6FB248E2D1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E838BFB-784F-4E36-990E-F50F554FCD15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9E5307-7E77-4002-95EF-7FE4AB32EBCE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "A537819A-95AD-406A-960B-A56DF4199B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E3CCD-39B6-43DB-A922-CBFE1CA5431D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F097E450-3E21-429E-8EDE-A20A32E205E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60030678-EC0C-4B4C-97DF-8B8EBE1DED97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2FE4D0-D0BB-407E-9270-88269BE962C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "012D6DF0-E257-48B0-AF01-3226E6065590", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5EFEB19-FCBB-4B6B-BAD2-786608E95E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21FDD77C-F607-48A0-9D03-29CC232213D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "A21D272B-5DA1-48C4-9C29-60FD1DA3B560", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADFF99F0-4651-4CC4-8CD5-01DF8929B10E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "13C2D96C-0AC1-476A-9674-957745E134C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D06CE4B7-C9DE-4EAF-8F94-2381AC559959", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5EF7960-4750-4ADA-B0A6-5B454A6A77E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/wt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EC378F8-533D-4F7C-99A3-0C2394C99172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:el_ppc_1000\\/wt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A942215-96BB-4E0C-AFBE-3FF70719B15F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8559D73D-1275-4275-93FD-77E252C5E4C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:el_ppc_1000\\/m:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F8F8B95-79EB-437E-A9CB-B5C0A9E395F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "525798C3-7035-43D1-99FE-653797DECA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*", "matchCriteriaId": "9797EACE-8534-486F-A48B-7509F7906CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "658A8B84-8735-4CB8-9E9F-702786DD630B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC14F03D-4C8C-4EB5-A4B9-D1D7364796D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B25B0B2-FFA4-43E4-B61B-EC322E39B084", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "92563152-F7DF-456A-828A-F225271F4B43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAC1465C-D4E4-40A8-BC36-FC5FD3F84EB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "717629B0-0981-4233-89AB-AF234847B639", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3684354-FC1C-47A7-9AD7-00AF992B7605", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B804BA1-9CD7-45AE-B28D-01337A800213", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054E26F9-188E-4F15-BB1A-8056639C69FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C7A6530-9CBF-432D-BA7B-45772C325A02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EE73860-B3B8-4A96-8129-9AF45686F966", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D68B1755-4154-4648-980E-3B998B9621C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA0714-60D4-4D6E-95A6-3195F84F3F2E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "18B811D9-EC0D-4623-AD5C-2757AD27604F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6C25A38-9F53-4AB9-A11F-9DF08D7CC9E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF2F5EFC-6FB1-44CC-A9FD-BAD6D6A29CD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C712CB21-C5C6-47E3-9C6A-E5E280E87062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D201C6-1DFD-4A0A-BCD7-024E5ADAFA0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8CC783-4144-422D-A154-72CC83D83E14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FCEF736-BE5C-4BA9-80E0-304D55073F36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "592BE162-B9B4-4CCD-A5CB-4C316B14BFB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4548FEDD-22AF-4753-A805-0FAA8BA22410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DD2E38F-01EA-4396-AE9E-B723FFA0E8D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DEB26DA-6CA5-4694-AB96-4E376C0D4018", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2EE280-6E1D-49C5-90B8-FA1940CC6E77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0ED092A-9CCC-4794-B8CC-531572B32F0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2596D20-A6F7-4FE7-9E94-11965188DB68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF7632B9-340A-4249-91B3-0C93232B3108", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BD42607-7668-4ACC-94F3-E4C1F510EE38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC743E65-BFC2-4149-AB51-F529AB934296", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB0A1D10-B700-40A2-9A89-DDBD809294DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBED3056-BE7E-47DA-9818-4D57E29E7586", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67B75497-625B-44D2-8552-F8AA597EA6D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA9B7B72-413E-4B2E-A68C-D5A748CA4CBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "766B3429-8B60-4774-BFCA-349F59846D6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EC738BF-9BDB-4969-B00E-253D47C583D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3452BB23-7A21-48F5-971F-9D8C92697B36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "45335605-EBA7-4C20-A334-A427656FD261", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "766841A0-9E9F-48A6-B815-467734AD7D68", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*", "matchCriteriaId": "CD355D0B-151A-457B-B0C9-7A6314315364", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1511A71-8E8B-4985-8A39-69C801D48BFC", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F8D4A368-64AF-412B-B5BB-AD6BC84F95C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13EA8C25-9918-456E-B0F5-206081207E98", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*", "matchCriteriaId": "070D8D5D-0703-41BC-8D44-8379409D7CFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D54BE23-10D8-4FD2-9C0F-49785E55E28D", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*", "matchCriteriaId": "1402705D-BB4B-4639-92A8-B939B6AB3173", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "482C1848-4840-4CE4-B8C1-E387CA672AB3", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*", "matchCriteriaId": "41507D57-119A-4EE6-8F3C-7DB635298F1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDA0CBED-0140-4319-817C-CAE812EA5815", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*", "matchCriteriaId": "74DC92AC-246D-4DA2-85B3-B33EA5839310", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9C4333E-242B-472B-88A6-41669FCE48E4", "versionEndExcluding": "2010", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:-:*:*:*:*:*:*", "matchCriteriaId": "E84371B8-69B9-4C60-B1AE-9EA89E25961B", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp1:*:*:*:*:*:*", "matchCriteriaId": "4CBC4304-6AD9-4C12-B814-76CCCF9EBF0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "222D35AE-B32B-4167-9A6D-E88CCF3C823C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6034789-ABD1-4035-8378-F0BA7157B087", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "20740117-8BC1-47B8-AA10-8ADF91F1CA86", "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "133DFB76-70D7-4480-B409-2A657DF3B6AD", "versionEndExcluding": "12.5.8", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "B66C5256-6863-4B81-BC82-B76320467449", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*", "matchCriteriaId": "5D98B374-B2FC-47C3-8376-B9F45664C436", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*", "matchCriteriaId": "B75207AF-2BB8-4D6B-AF4C-BEB25895BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*", "matchCriteriaId": "4091C844-6778-46D2-B135-CD4E3FAA0714", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*", "matchCriteriaId": "7A3308A7-AF6A-4519-92E2-EF5FE6F9C78B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*", "matchCriteriaId": "BB2F377F-7260-47FE-9F50-40374EA1ED9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*", "matchCriteriaId": "B73A27AE-5483-4F59-9D03-1E65CEFB5EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*", "matchCriteriaId": "67E6B861-B758-48C6-9B4E-CA348D4A8D11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*", "matchCriteriaId": "25D9AB99-4AD7-4765-9832-44180E038BB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*", "matchCriteriaId": "0AB2650C-DF46-498E-AD6E-549649A20849", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*", "matchCriteriaId": "CE7D5CA7-2D77-4B44-AE53-DF07A9D3E43F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*", "matchCriteriaId": "7E9270E3-F4FC-43ED-BA80-67F321BF33C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*", "matchCriteriaId": "B687FC8F-DE82-446B-8EB1-3F3193735D26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*", "matchCriteriaId": "1B710A10-5076-4473-88AE-CA4A9935DF77", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*", "matchCriteriaId": "432C66F0-03FA-4E0A-805F-7505B92C348B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*", "matchCriteriaId": "4B0B6D86-60E9-4193-8E8B-F07DF7410746", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*", "matchCriteriaId": "D17F3263-3107-4785-BF6B-8A62A13FC720", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*", "matchCriteriaId": "5A86BD5F-3858-4E50-995A-CEBE0C0FC19C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*", "matchCriteriaId": "0FB7F12A-3C70-41DC-B64F-990316118A07", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*", "matchCriteriaId": "A1CF97B6-E3AE-47A6-A49F-3BFE66CB87F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*", "matchCriteriaId": "A644757F-6A6F-49F5-9B81-06F10C5E34EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*", "matchCriteriaId": "D84D5E4F-DDBA-42B7-974B-02DCB780E8CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*", "matchCriteriaId": "979169D0-0C6E-4B4A-8FEA-FEBE33B09D0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*", "matchCriteriaId": "20EB85A2-0051-430F-85B8-C2DA446E0AC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*", "matchCriteriaId": "12156ABC-3724-4F3E-9E38-7C2C896C48EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*", "matchCriteriaId": "BC573DAD-46D1-473A-B530-862DD301F287", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*", "matchCriteriaId": "08A9F95B-6B7A-4CDE-94AC-3235ED59B1E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*", "matchCriteriaId": "05F30A0A-DC59-4BDE-9060-BE25E35A21BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*", "matchCriteriaId": "A6B31963-6FA3-4EC8-9F95-A999EB95B3F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*", "matchCriteriaId": "B7DE1928-2F1F-442C-9E10-080AD9BD8D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*", "matchCriteriaId": "D52E2286-239F-4486-9FB1-40ABF2C3A4D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*", "matchCriteriaId": "7D8617AE-22D6-4A9A-864B-6B104AE19826", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*", "matchCriteriaId": "9AE60429-3163-4621-9973-9569C489D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*", "matchCriteriaId": "946564F5-90DF-47FB-B704-434222171F72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*", "matchCriteriaId": "7B371375-2F70-4A5C-81A1-3D24236EE06C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*", "matchCriteriaId": "2D89D1FB-354B-4F47-9B68-BC88266C603D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*", "matchCriteriaId": "990EA9A7-AA65-41D9-BFC3-987DEB875AF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*", "matchCriteriaId": "45930839-7669-46B1-88A8-EC7448CFAA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*", "matchCriteriaId": "116EC72C-1639-4E89-8DA5-14F326D8E91D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*", "matchCriteriaId": "56ED6A51-50F6-4181-9FFB-411854102B44", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*", "matchCriteriaId": "013566F1-27AD-408A-9ADE-3D88865FC560", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*", "matchCriteriaId": "B924FE54-CA68-4C95-A9DA-DD37F2B8D851", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*", "matchCriteriaId": "953DC00C-C694-4AFF-AC8D-3EF8F7B2EA9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*", "matchCriteriaId": "71726A09-D9DE-4063-8B83-35F5E1C15C4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*", "matchCriteriaId": "466ADBAF-9B8A-4F46-A061-3892CDFE0BE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*", "matchCriteriaId": "A5E9B1C7-54CF-4761-ACC4-85D706ECE6FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*", "matchCriteriaId": "7870F2CD-247B-4F1F-BE7E-B0A73210CB7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*", "matchCriteriaId": "21D439E5-9283-41F2-A68E-48C27648A4F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*", "matchCriteriaId": "FE762CF7-9B71-4E79-AF1F-077FF2584F3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*", "matchCriteriaId": "A86BD94F-D60A-4E5C-808D-F129B2C221F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*", "matchCriteriaId": "91CA06BB-2978-48E7-974C-AE588D0B773B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*", "matchCriteriaId": "AEC96D0F-56B5-4582-8519-5CFD59276221", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*", "matchCriteriaId": "D8285D4D-9962-42CC-95C6-F5452EA62B11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*", "matchCriteriaId": "C715C51F-F1FC-4B92-BF77-EC75882CFE02", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*", "matchCriteriaId": "F1BA0B41-E7B7-469F-BEB1-73A6A3315BA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*", "matchCriteriaId": "26E44694-3121-4F50-9052-BAB42D6B45C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*", "matchCriteriaId": "CF156298-D57B-4F30-8895-C3DCE5D8FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*", "matchCriteriaId": "2485CC85-A58A-41A3-A0C3-F52C82D772A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*", "matchCriteriaId": "3CB9206E-98ED-472F-8272-3DA2FEA82696", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*", "matchCriteriaId": "83FEB3AF-DB9D-4958-AC26-04C694F0416A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*", "matchCriteriaId": "62A760D9-FEA2-49AD-8250-3A830398ECD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*", "matchCriteriaId": "43E6E75D-D814-4DAA-9759-6948955501DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*", "matchCriteriaId": "BEFD9527-F0CA-493B-A894-4BB26AB65F54", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*", "matchCriteriaId": "9DC241D3-4352-4339-8C81-BA7878FD5062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*", "matchCriteriaId": "D2E50F31-00DB-4724-982E-E39E55E75FBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*", "matchCriteriaId": "1099C9B4-11A1-4545-8054-5CC247286617", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*", "matchCriteriaId": "8F018232-8B68-4496-A38B-6E1B84F1AA28", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*", "matchCriteriaId": "D0F66CE5-E0BD-41B4-9D36-1C626FFF2141", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*", "matchCriteriaId": "08CB5270-1BD3-48D0-AB8C-B3CF0C52499F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*", "matchCriteriaId": "EC263338-15D1-4F8C-8BE7-494971F31682", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*", "matchCriteriaId": "061C95B9-845F-4235-9ABE-7BD5F555209C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*", "matchCriteriaId": "75EB3FC3-C4C1-4841-88E6-922CADC9B402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*", "matchCriteriaId": "FE0F78D7-2139-46AD-9C69-229BA94896D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*", "matchCriteriaId": "A630790E-2F77-4C05-91BD-06AB8894A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*", "matchCriteriaId": "6A96EA60-16A8-4129-8E2E-B8B5C4F83D39", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*", "matchCriteriaId": "A30EE76C-594A-4DD2-95D5-8E8D8B6D3185", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*", "matchCriteriaId": "D9A31A47-DE48-42AA-B7CD-4661624A50A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*", "matchCriteriaId": "B0CC39CC-45DF-4461-9219-808CBE68592A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*", "matchCriteriaId": "4FAC6817-6316-4592-8510-02772D3EFF3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*", "matchCriteriaId": "711F5017-AEC2-4649-AA8A-6A596591F11C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*", "matchCriteriaId": "A12209C7-0027-46B1-A8D8-535A631A4FA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*", "matchCriteriaId": "8D09CF29-38FD-487F-8597-518F206531BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*", "matchCriteriaId": "D35EAA15-0DEA-42D8-AEFE-F4CB6BC6CFEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*", "matchCriteriaId": "BEC12F16-071D-4648-A044-1274CBACE988", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*", "matchCriteriaId": "0763BDFC-0D5D-43E0-BD3C-F6A7D41F53C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*", "matchCriteriaId": "57160A54-9049-4F31-AF1A-28A18F0EFF95", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*", "matchCriteriaId": "54AD4072-BFAE-4941-8CC3-6DE5E3222DAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*", "matchCriteriaId": "9109EB3E-C635-4B99-9BE5-B9FD9C4B5D6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*", "matchCriteriaId": "2E01FEF6-8D64-428E-AFB0-FFEB21CCDC39", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*", "matchCriteriaId": "910B3A6A-F418-4A0E-B612-DECD4900BB14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*", "matchCriteriaId": "A6B5E386-0BFC-4F1B-9D1A-E2F31C8A05BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*", "matchCriteriaId": "29175BA1-3A31-4E9E-8B52-B078CC33F51C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*", "matchCriteriaId": "573A99EF-0B6B-41D6-B71F-1C21B1565A3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*", "matchCriteriaId": "209AD390-0ABA-4225-9168-A769ED7808DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*", "matchCriteriaId": "C4553BE6-DEDE-4E16-A335-1F8DE5F7B9E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*", "matchCriteriaId": "5909ED7E-B49C-42D5-A634-788733D49FE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*", "matchCriteriaId": "21B55E0E-8923-4779-970F-A335C708CD3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*", "matchCriteriaId": "D0B9CB8C-8072-46E3-8A6F-41FDB2365436", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*", "matchCriteriaId": "6C2C8471-D52C-41DF-A96B-E6D0A1E7A070", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*", "matchCriteriaId": "E2A9B43C-51F7-42C6-84CD-B882055915B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*", "matchCriteriaId": "9F239FF7-CA1E-4711-A8A8-C1F945366E19", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*", "matchCriteriaId": "7E696E99-6F94-4C74-911A-01162CA34B15", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*", "matchCriteriaId": "0B18A0A1-F28F-4282-B871-06344A674EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*", "matchCriteriaId": "FE2DA304-2C7F-4F5A-A3D0-0DF15E442B1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*", "matchCriteriaId": "EEF8BCE8-567E-4392-AD10-4DC4EF93E5CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "155A0C39-4D0A-4264-B392-46002908939C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*", "matchCriteriaId": "514DE9F5-D826-42AA-B4CF-3EB09F4D3D5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96AB8C81-F441-4563-B5E0-B738DF4D1C50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDA3C472-D1E9-47B3-AFD0-BD274E3291F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E30BECA7-C45A-423D-9200-98D51BE9C84C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E376B2A-430D-4D1D-BC28-92CD7E1E8564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4164A584-6F0D-4154-8FED-DC044CDE1FE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*", "matchCriteriaId": "74C9E6FC-9C40-4105-9FB0-17013E1ABBB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B37176F-0AF4-4410-9C1F-4C5ED0051681", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2F2936E-A611-472E-8EF0-F336A19DF578", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D200C1F-1909-4952-824F-A2D279B9B37E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FC9F68C-7D65-4D29-AAA1-BA43228C6208", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de un canal lateral." } ], "id": "CVE-2017-5753", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-04T13:29:00.257", "references": [ { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102371" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "secure@intel.com", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-17 14:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/101887 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1039835 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0018.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101887 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039835 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0018.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 12.0.0 | |
vmware | workstation | 12.0.1 | |
vmware | workstation | 12.1 | |
vmware | workstation | 12.1.1 | |
vmware | workstation | 12.5 | |
vmware | workstation | 12.5.1 | |
vmware | workstation | 12.5.2 | |
vmware | workstation | 12.5.3 | |
vmware | workstation | 12.5.4 | |
vmware | workstation | 12.5.5 | |
vmware | workstation | 12.5.6 | |
vmware | workstation | 12.5.7 | |
vmware | fusion | 8.0.0 | |
vmware | fusion | 8.0.1 | |
vmware | fusion | 8.0.2 | |
vmware | fusion | 8.1.0 | |
vmware | fusion | 8.1.1 | |
vmware | fusion | 8.5.0 | |
vmware | fusion | 8.5.1 | |
vmware | fusion | 8.5.2 | |
vmware | fusion | 8.5.3 | |
vmware | fusion | 8.5.4 | |
vmware | fusion | 8.5.5 | |
vmware | fusion | 8.5.6 | |
vmware | fusion | 8.5.7 | |
vmware | fusion | 8.5.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C2CB0-9A2B-46B2-9E75-2BADAE722BB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D38FB28D-8A42-4877-92AF-39EE04B14DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "180E48AF-AD42-4A00-948A-9C1D70BE53F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "66C64A90-90A2-450A-8A79-AB69B5A939DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE6B9B4F-53C5-4B47-89C4-AD221DC91D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E293B67-98C3-4D8E-883C-2F2F774AE6F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AB307F39-3A90-4B62-B2BF-0E0CEBBBBC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "838C7C08-15ED-4379-8A5B-9419D13AE7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C064187-0870-4672-9D64-92D643FA9C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "60F08698-0194-4892-9A46-93C53C0C660B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "287275D4-E311-4A1B-BC5C-2FB3A64691E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "ED552760-4DB1-4E56-B6C1-23E053858055", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "25BBD4C7-C851-4D40-B6DD-92873319CD28", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDD345B3-810C-41D1-82CE-0CA0B4B1F5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "768A4D3B-CC19-4A3A-91D5-9C974F7F0247", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5D443-A330-40DF-939B-10597147CE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "42BF8A2A-295D-44D6-A38E-D4C35437F380", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC08D3D5-5D46-45C7-BD43-81E1D18FAB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "574DB25B-51E1-466A-8089-5108DB5D6FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0BF7F09F-D8B3-40AF-9111-E7C14832C5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "555DD10F-7EA8-4107-A31F-2C7CED41058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "7EE4888B-156C-48BC-8035-3A0424CB6037", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "6D4DA202-3D18-4DDC-89E4-81FFF68EDFD0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." }, { "lang": "es", "value": "VMware Workstation (en versiones 12.x anteriores a la 12.5.8) y Fusion (en versiones 8.x anteriores a la 8.5.9) contienen una vulnerabilidad de desreferencia de puntero NULL en una llamada de un usuario invitado. Una explotaci\u00f3n exitosa de este error puede permitir que atacantes con privilegios de usuario normal cierren de forma inesperada sus m\u00e1quinas virtuales." } ], "id": "CVE-2017-4938", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-17T14:29:00.700", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101887" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039835" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101887" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-781/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-781/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine\u0027s vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5. 5), contienen una vulnerabilidad de escritura fuera de l\u00edmites en el controlador USB 3.0 (xHCI). Un actor malicioso con privilegios administrativos locales en una m\u00e1quina virtual puede ser capaz de explotar este problema para bloquear el proceso vmx de la m\u00e1quina virtual que conlleva a una condici\u00f3n de denegaci\u00f3n de servicio o ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual. Unas condiciones adicionales m\u00e1s all\u00e1 del control del atacante deben estar presentes para que la explotaci\u00f3n pueda ser posible" } ], "id": "CVE-2020-3968", "lastModified": "2024-11-21T05:32:04.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.383", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-781/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-781/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-01-20 16:00
Modified
2025-04-09 00:30
Severity ?
Summary
vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2009/000054.html | Patch | |
cve@mitre.org | http://osvdb.org/51180 | ||
cve@mitre.org | http://seclists.org/fulldisclosure/2009/Apr/0036.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/33372 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34601 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/34373 | Exploit | |
cve@mitre.org | http://www.securitytracker.com/id?1021512 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0005.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0024 | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0944 | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/7647 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2009/000054.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/51180 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2009/Apr/0036.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33372 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34601 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34373 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1021512 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0005.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0024 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0944 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/7647 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | ace | * | |
vmware | ace | 2.5.0 | |
vmware | fusion | * | |
vmware | server | 2.0.0 | |
vmware | vmware_player | * | |
vmware | vmware_player | 1.0.0 | |
vmware | vmware_player | 1.0.1 | |
vmware | vmware_player | 1.0.2 | |
vmware | vmware_player | 1.0.3 | |
vmware | vmware_player | 1.0.4 | |
vmware | vmware_player | 1.0.6 | |
vmware | vmware_player | 1.0.7 | |
vmware | vmware_player | 1.0.8 | |
vmware | vmware_player | 1.0.9 | |
vmware | vmware_player | 1.05 | |
vmware | vmware_player | 2.0 | |
vmware | vmware_player | 2.0.1 | |
vmware | vmware_player | 2.0.2 | |
vmware | vmware_player | 2.0.3 | |
vmware | vmware_player | 2.0.4 | |
vmware | vmware_player | 2.0.5 | |
vmware | vmware_player | 2.5 | |
vmware | vmware_workstation | * | |
vmware | vmware_workstation | 4.5.3 | |
vmware | vmware_workstation | 5.0 | |
vmware | vmware_workstation | 5.5.0 | |
vmware | vmware_workstation | 5.5.1 | |
vmware | vmware_workstation | 5.5.2 | |
vmware | vmware_workstation | 5.5.3 | |
vmware | vmware_workstation | 5.5.4 | |
vmware | vmware_workstation | 5.5.5 | |
vmware | vmware_workstation | 5.5.6 | |
vmware | vmware_workstation | 5.5.7 | |
vmware | vmware_workstation | 5.5.8 | |
vmware | vmware_workstation | 6.0 | |
vmware | vmware_workstation | 6.0.1 | |
vmware | vmware_workstation | 6.0.2 | |
vmware | vmware_workstation | 6.0.3 | |
vmware | vmware_workstation | 6.0.4 | |
vmware | vmware_workstation | 6.0.5 | |
vmware | vmware_workstation | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D249F86-E463-4AB1-BEEE-0828D5A2D761", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "4004A38A-01A6-41BE-84EB-1D7C7FAD0214", "versionEndIncluding": "2.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "318D5F4B-48C5-4214-B60C-9A2EEEF44835", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3771AFCF-E247-427A-8076-9E36EA457658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "17C124AC-C421-459E-8251-E7B3BD33874B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "65DD6966-72EA-4C4D-BC90-B0D534834BA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "EBFC9B7A-8A40-467B-9102-EE5259EC4D14", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5E684965-43F7-4A51-850F-4C88F42940E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "357B60EC-C5F1-4FA4-B4AF-F81298479D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "933562E3-B6D5-4250-A07B-AB8437ED4D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "09F23F68-6853-4862-99CB-4F214816358F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "AAFBF6B0-5E0A-4F62-82C7-D9861D0F5F31", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "43282BF6-665C-4F77-8E95-487523863965", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4FFF490-8AA9-4296-99F0-DC57E5D4F56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FC850AB-7728-4EE3-9EB5-E1E4D7338202", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B1CA212-4114-4D45-B746-9C2AAF60CFCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5085E31D-7472-408B-A85D-90337407A24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D57F024-3484-4EEA-8F9E-08A1AE5E3D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "13D82E91-181E-4E7D-943D-6FC74D40CEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "21C496BC-404A-4C23-A0CB-DEE8BB8550A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8EF66E7-ECDA-40F9-9070-5857D2DEF818", "versionEndIncluding": "6.51", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "0790DFEB-3ADE-4057-BA9D-025BD5F5B477", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "433C05BD-1CAC-4F40-9F69-D0333C5F0E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "270D5FAD-A226-4F6F-BF0B-2C6D91C525D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6811B662-07E0-4B95-BFC6-C87C02110C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "504CD24F-2EC6-45C0-8E46-69BAE8483521", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0EAB3D2-79EE-43A3-8A08-3E8140C1B1A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "BE15637B-FAE4-4FC7-8F45-B3B1554F8F3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD26B9-60A6-4D6B-B031-0DA8A9F3323F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "6B32C157-020F-400B-970C-B93CF573EB27", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "D2E1F0A2-8791-4627-8583-55B2A67D2F42", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "3767CDDC-DF72-4AAE-B544-D2DFE02A199D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "640130AA-C905-4DD6-97BD-ABA90705F0B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B7632A4-D120-434D-B35A-303640DB37AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6DFFE01E-BD0A-432E-B47C-D68DAADDD075", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "02EBBFDD-AC46-481A-8DA7-64619B447637", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "CC0B1FF0-80DC-433B-9298-346225060808", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0ECA0396-CBCA-4D21-BD9A-EFCE24D616D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "94533C3D-8767-44DB-ABF7-B991C3E47858", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command." }, { "lang": "es", "value": "En la biblioteca vmwarebase.dll, tal y como es usado en el servicio vmware-authd (tambi\u00e9n se conoce como vmware-authd.exe), en VMware Workstation versi\u00f3n 6.5.1 build 126130, versi\u00f3n 6.5.1 y anteriores; VMware Player versi\u00f3n 2.5.1 build 126130, versi\u00f3n 2.5.1 y anteriores; VMware ACE versi\u00f3n 2.5.1 y anteriores; VMware Server versiones 2.0.x anteriores a 2.0.1 build 156745; y VMware Fusion anterior a versi\u00f3n 2.0.2 build 147997, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) por medio de un comando largo (1) USUARIO o (2) PASS." } ], "id": "CVE-2009-0177", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-01-20T16:00:09.030", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/51180" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33372" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34601" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34373" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021512" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0024" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/7647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/51180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/7647" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-07 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/97164 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97164 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion_pro | * | |
apple | mac_os_x | - | |
vmware | workstation_player | * | |
vmware | workstation_pro | * | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1671-5010-4BB5-BFA7-217FBB946B59", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3E0004-E6F1-4C0D-9B24-A7F1AF4BCBD8", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB0B91B-F8F6-456F-8FBD-7B98A9ABA95A", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F1AB0A-CD31-4FE7-AE1F-4C6A111D1C62", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "matchCriteriaId": "4DC223AC-EB3D-48CF-A6CC-D35E00A38394", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "matchCriteriaId": "75C8E87E-A869-49F8-89F9-DE64A45CDB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "matchCriteriaId": "E7F8878C-F73D-4549-9607-74880176D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "matchCriteriaId": "E47D369F-13B2-42B3-BB74-60AAD0954B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak." }, { "lang": "es", "value": "ESXi versiones 6.5 sin parche ESXi650-201703410-SG, 6.0 U3 sin parche ESXi600-201703401-SG, 6.0 U2 sin parche ESXi600-201703403-SG, 6.0 U1 sin parche ESXi600-201703402-SG, 5.5 sin parche ESXi550-201701401-SG; Workstation Pro / Player versiones 12.x anteriores a 12.5.5; y Fusion Pro / Fusion versiones 8.x anteriores a 8.5.6 de VMware, presenta un uso de memoria no inicializada. Este problema puede conducir a un filtrado de informaci\u00f3n." } ], "id": "CVE-2017-4905", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-07T18:29:00.413", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97164" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit, Third Party Advisory, VDB Entry | |
security@vmware.com | http://seclists.org/fulldisclosure/2020/Jul/22 | Exploit, Mailing List, Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Jul/22 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202006401-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.2) y Fusion (versiones 11.x anteriores a 11.5. 2), contiene una vulnerabilidad de uso de la memoria previamente liberada en PVNVRAM. Un actor malicioso con acceso local a una m\u00e1quina virtual puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria f\u00edsica" } ], "id": "CVE-2020-3963", "lastModified": "2024-11-21T05:32:04.127", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.053", "references": [ { "source": "security@vmware.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" }, { "source": "security@vmware.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 21:05
Modified
2025-04-11 00:51
Severity ?
Summary
vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000112.html | Mailing List, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/69584 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/42453 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/42482 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/514995/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/45168 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id?1024819 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id?1024820 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0018.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2010/3116 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000112.html | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/69584 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42453 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42482 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514995/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45168 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024819 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024820 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0018.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3116 | Broken Link, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.0 | |
vmware | workstation | 7.0.1 | |
vmware | workstation | 7.1 | |
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
linux | linux_kernel | - | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
linux | linux_kernel | - | |
vmware | server | 2.0.2 | |
linux | linux_kernel | - | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34F436D4-B7B7-43CB-A2BD-C5E791F7E3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF53DB66-4C79-47BB-AABD-6DCE2EF98E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files." }, { "lang": "es", "value": "vmware-mount en VMware Workstation 7.x anteriores a la 7.1.2 build 301548 en Linux, VMware Player 3.1.x anteriores a la 3.1.2 build 301548 en Linux, VMware Server 2.0.2 en Linux, y VMware Fusion 3.1.x anteriores a la 3.1.2 build 332101 no carga apropiadamente las librer\u00edas, lo que permite a los usuarios del SO base escalar privilegios a trav\u00e9s de vectores que involucran ficheros objeto compartidos." } ], "id": "CVE-2010-4296", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-12-06T21:05:49.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/69584" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42453" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42482" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/45168" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024819" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024820" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/69584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/45168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3116" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-25 22:15
Modified
2025-02-04 18:15
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B628132D-043A-4989-9524-9FA53B1DEADC", "versionEndExcluding": "13.0.2", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "53930936-892B-421E-B75C-BD2DEC4A09AA", "versionEndExcluding": "17.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine." } ], "id": "CVE-2023-20869", "lastModified": "2025-02-04T18:15:32.880", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-25T22:15:09.420", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-24 17:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-785/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-785/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5. 5), contienen una vulnerabilidad de uso de la memoria previamente liberada en el dispositivo SVGA. Un actor malicioso con acceso local a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados puede ser capaz de explotar esta vulnerabilidad para ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual" } ], "id": "CVE-2020-3962", "lastModified": "2024-11-21T05:32:03.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-24T17:15:12.477", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-785/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-785/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-05-22 13:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware Workstation (14.x before 14.1.2) and Fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to NULL pointer dereference issues in the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-Service of their guest machine.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/104237 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040957 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0013.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104237 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040957 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0013.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C4E179-64D8-44F4-A60E-2C67268669C1", "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CD4990A-14DD-414B-8946-680D7BF5D29E", "versionEndExcluding": "14.1.2", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.2) and Fusion (10.x before 10.1.2) contain multiple denial-of-service vulnerabilities that occur due to NULL pointer dereference issues in the RPC handler. Successful exploitation of these issues may allow an attacker with limited privileges on the guest machine trigger a denial-of-Service of their guest machine." }, { "lang": "es", "value": "VMware Fusion (versiones 10.x anteriores a la 10.1.2) contiene una vulnerabilidad de omisi\u00f3n de firmas que podr\u00eda conducir a un escalado de privilegios local." } ], "id": "CVE-2018-6963", "lastModified": "2024-11-21T04:11:29.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-22T13:29:00.437", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104237" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040957" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-08 10:28
Modified
2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in VMware Tools in VMware Workstation before 8.0.4, VMware Player before 4.0.4, VMware Fusion before 4.1.2, VMware View before 5.1, and VMware ESX 4.1 before U3 and 5.0 before P03 allows local users to gain privileges via a Trojan horse tpfc.dll file in the current working directory.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html | ||
cve@mitre.org | https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | workstation | 8.0 | |
vmware | workstation | 8.0.0.18997 | |
vmware | workstation | 8.0.1 | |
vmware | workstation | 8.0.1.27038 | |
vmware | workstation | 8.0.2 | |
vmware | player | * | |
vmware | player | 4.0 | |
vmware | player | 4.0.0.18997 | |
vmware | player | 4.0.1 | |
vmware | player | 4.0.2 | |
vmware | fusion | * | |
vmware | fusion | 4.0 | |
vmware | fusion | 4.0.1 | |
vmware | fusion | 4.0.2 | |
vmware | fusion | 4.1 | |
vmware | view | * | |
vmware | view | 4.6.0 | |
vmware | esx | 4.1 | |
vmware | esx | 5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "C31BB23E-4BAF-4C07-B613-98E590695A7B", "versionEndIncluding": "8.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "matchCriteriaId": "01483038-BC89-44BA-B07B-362FC5D7E8C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "matchCriteriaId": "B671AC17-7064-4541-ADB3-FCD72109C766", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A0EAA7-72FF-4910-931B-D18C7407CF1E", "versionEndIncluding": "4.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*", "matchCriteriaId": "81AFBBE6-0B3B-44DB-BBEB-08C8B2C39038", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B8519FA-C221-4D6F-B418-D2FED3B9D634", "versionEndIncluding": "4.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "60234129-7F7F-49FA-A425-CDAB4D09AB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4FB73EC4-F3CE-428B-BA40-47FB21181543", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "927863C2-5A61-4137-83AC-6CF3F2958941", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F74559CB-6E52-421F-88F3-739913C26C8E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:view:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2D11ED8-646B-4F8E-A0E5-56C6964F9D61", "versionEndIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "4346ED63-851E-43E9-933D-7CCAFA43B17B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E52EEFA3-BE68-4AFF-A22C-036D33306AF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in VMware Tools in VMware Workstation before 8.0.4, VMware Player before 4.0.4, VMware Fusion before 4.1.2, VMware View before 5.1, and VMware ESX 4.1 before U3 and 5.0 before P03 allows local users to gain privileges via a Trojan horse tpfc.dll file in the current working directory." }, { "lang": "es", "value": "Vulnerabilidad de path de b\u00fasqueda no confiable en VMware Tools en VMware Workstation anteriores a v8.0.4, VMware Player anteriores a v4.0.4, VMware Fusion anteriores a v4.1.2, VMware View anteriores a v5.1, y VMware ESX v4.1 anteriores a vU3 y v5.0 anteriores a vP03, permite a usuario locales obtener privilegios a trav\u00e9s de un fichero tpfc.dll troyanizado en el directorio de trabajo actual." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n\u0027CWE-426 Untrusted Search Path\u0027", "id": "CVE-2012-1666", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-08T10:28:20.367", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html" }, { "source": "cve@mitre.org", "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 21:05
Modified
2025-04-11 00:51
Severity ?
Summary
Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000112.html | Mailing List, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/69585 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/42453 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/42482 | Broken Link, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/514995/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/45167 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id?1024819 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id?1024820 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0018.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2010/3116 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000112.html | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/69585 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42453 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42482 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514995/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45167 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024819 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024820 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0018.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3116 | Broken Link, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.0 | |
vmware | workstation | 7.0.1 | |
vmware | workstation | 7.1 | |
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
linux | linux_kernel | - | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
linux | linux_kernel | - | |
vmware | server | 2.0.2 | |
linux | linux_kernel | - | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34F436D4-B7B7-43CB-A2BD-C5E791F7E3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF53DB66-4C79-47BB-AABD-6DCE2EF98E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files." }, { "lang": "es", "value": "Condici\u00f3n de carrera en el proceso de montaje de vmware-mount en VMware Workstation 7.x anteriores a la 7.1.2 build 301548 en Linux, VMware Player 3.1.x anteriores a la 3.1.2 build 301548 en Linux, VMware Server 2.0.2 en Linux, y VMware Fusion 3.1.x anteriores a la 3.1.2 build 332101 permite a usuarios del SO anfitri\u00f3n escalar privilegios a trav\u00e9s de vectores que involucran archivos temporales." } ], "id": "CVE-2010-4295", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-12-06T21:05:49.403", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/69585" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42453" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42482" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/45167" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024819" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024820" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/69585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/42482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/45167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1024820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3116" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-20 16:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0021.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0021.html | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B332C2-587E-49DB-8346-7F87BBE2E44F", "versionEndExcluding": "15.5.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "06D524E6-E4CA-47CE-BF68-0D33CB9391A4", "versionEndExcluding": "11.5.1", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an out-of-bounds write vulnerability in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition on their own VM." }, { "lang": "es", "value": "VMware Workstation (versiones 15.x anteriores a 15.5.1) y Fusion (versiones 11.x anteriores a 11.5.1), contienen una vulnerabilidad de escritura fuera de l\u00edmites en el adaptador de red virtual e1000e. Una explotaci\u00f3n con \u00e9xito de este problema puede conllevar a una ejecuci\u00f3n de c\u00f3digo en el host del invitado o puede permitir a atacantes crear una condici\u00f3n de denegaci\u00f3n de servicio en su propia VM." } ], "id": "CVE-2019-5541", "lastModified": "2024-11-21T04:45:09.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-20T16:15:13.060", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-12 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
cve@mitre.org | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39198 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39206 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt | ||
cve@mitre.org | http://www.securityfocus.com/bid/39394 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023832 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023833 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39198 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39206 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/39394 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023832 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023833 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 6.5.0 | |
vmware | workstation | 6.5.1 | |
vmware | workstation | 6.5.2 | |
vmware | workstation | 6.5.3 | |
microsoft | windows | * | |
vmware | player | 2.5 | |
vmware | player | 2.5.1 | |
vmware | player | 2.5.2 | |
vmware | player | 2.5.3 | |
microsoft | windows | * | |
vmware | ace | 2.5.0 | |
vmware | ace | 2.5.1 | |
vmware | ace | 2.5.2 | |
vmware | ace | 2.5.3 | |
microsoft | windows | * | |
vmware | server | 2.0.0 | |
vmware | server | 2.0.1 | |
vmware | server | 2.0.2 | |
microsoft | windows | * | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | fusion | 2.0.3 | |
vmware | fusion | 2.0.4 | |
vmware | fusion | 2.0.5 | |
vmware | fusion | 3.0 | |
microsoft | windows | * | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
microsoft | windows | * | |
vmware | esx | 2.5.5 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5674C3DD-F510-4701-ACA8-437576307528", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E62960B2-91AE-4DD7-8085-9BA6BCB84473", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBCA2A03-0A31-4290-987A-BE715758BA95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "26B7268F-A170-4366-9196-E73A956883DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B037838B-072E-4676-9E5D-86F5BC207512", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk." }, { "lang": "es", "value": "VMware Tools en VMware Workstation v6.5.x anterior v6.5.4 build 246459; VMware Player v2.5.x anterior v2.5.4 build 246459; VMware ACE v2.5.x anterior v2.5.4 build 246459; VMware Server v2.x anterior v2.0.2 build 203138; VMware Fusion v2.x anterior v2.0.6 build 246742; VMware ESXi v3.5 y v4.0; y VMware ESX v2.5.5, v3.0.3, v3.5, y v4.0 no cargan adecuadamente los programas VMware, lo que puede permitir a usuarios de petici\u00f3n de sistemas operativos Windows obtener privilegios estableciendo un troyano en una direcci\u00f3n no especificada en el disco de petici\u00f3n OS." } ], "id": "CVE-2010-1142", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-12T18:30:00.710", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39198" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/39394" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023832" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023833" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.acrossecurity.com/aspr/ASPR-2010-04-12-2-PUB.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-01 21:30
Modified
2024-11-21 04:45
Severity ?
Summary
VMware VMware Fusion (11.x before 11.0.3) contains a security vulnerability due to certain unauthenticated APIs accessible through a web socket. An attacker may exploit this issue by tricking the host user to execute a JavaScript to perform unauthorized functions on the guest machine where VMware Tools is installed. This may further be exploited to execute commands on the guest machines.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securityfocus.com/bid/107637 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107637 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware VMware Fusion (11.x before 11.0.3) contains a security vulnerability due to certain unauthenticated APIs accessible through a web socket. An attacker may exploit this issue by tricking the host user to execute a JavaScript to perform unauthorized functions on the guest machine where VMware Tools is installed. This may further be exploited to execute commands on the guest machines." }, { "lang": "es", "value": "VMware VMware Fusion (en las versiones 11.x anteriores a la 11.0.3) contiene una vulnerabilidad de seguridad debido a determinadas API sin autenticar accesibles a trav\u00e9s de un socket web. Un atacante podr\u00eda explotar este fallo enga\u00f1ando al usuario host para que ejecute c\u00f3digo JavaScript para realizar funciones no autorizadas en la m\u00e1quina invitada donde las herramientas VMware est\u00e1n instaladas. Esto podr\u00eda explotarse a\u00fan m\u00e1s para ejecutar comandos en las m\u00e1quinas invitadas" } ], "id": "CVE-2019-5514", "lastModified": "2024-11-21T04:45:05.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-01T21:30:43.860", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107637" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-16 17:15
Modified
2024-11-21 05:49
Severity ?
Summary
VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E834FF90-171F-4581-8AB2-AC55C1252DD4", "versionEndExcluding": "4.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files." }, { "lang": "es", "value": "VMware ESXi contiene una vulnerabilidad TOCTOU (Time-of-check Time-of-use) que se presenta en la forma de manejar los archivos temporales. Un actor malicioso con acceso a settingsd, puede explotar este problema para escalar sus privilegios al escribir archivos arbitrarios" } ], "id": "CVE-2021-22043", "lastModified": "2024-11-21T05:49:29.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-16T17:15:10.593", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-20 18:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757 | Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0012.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0012.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7A2CFA-E5C0-49F9-8E60-0965AEBE364D", "versionEndExcluding": "14.1.6", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D75366-3750-458A-BAF4-6DC91CC08948", "versionEndExcluding": "15.0.3", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6) and Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain an out-of-bounds read vulnerability in the pixel shader functionality. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." }, { "lang": "es", "value": "VMware ESXi (versi\u00f3n 6.7 anterior a ESXi670-201904101-SG y versi\u00f3n 6.5 anterior a ESXi650-201903001), Workstation (versiones 15.x anteriores a 15.0.3 y versiones 14.x anteriores a 14.1.6) y Fusion (versiones 11.x anteriores a 11.0.3 y versiones 10.x anterior a 10.1.6), contienen una vulnerabilidad de lectura fuera de l\u00edmites en la funcionalidad pixel shader. La explotaci\u00f3n con \u00e9xito de este problema puede conllevar a la divulgaci\u00f3n de informaci\u00f3n o puede permitir a atacantes con privilegios normales de usuario crear una condici\u00f3n de denegaci\u00f3n de servicio sobre el host. La explotaci\u00f3n de este problema requiere que un atacante tenga acceso a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados. No est\u00e1 habilitado por defecto en ESXi y est\u00e1 habilitado por defecto en Workstation y Fusion." } ], "id": "CVE-2019-5521", "lastModified": "2024-11-21T04:45:06.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-20T18:15:10.740", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0012.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-10 17:15
Modified
2024-11-21 04:45
Severity ?
Summary
ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | horizon | * | |
vmware | horizon | * | |
vmware | horizon | * | |
vmware | remote_console | * | |
vmware | remote_console | * | |
vmware | workstation | * | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon:*:*:*:*:*:linux:*:*", "matchCriteriaId": "66E46789-B74B-466A-A43F-410A236C088F", "versionEndExcluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon:*:*:*:*:*:macos:*:*", "matchCriteriaId": "7D28A052-4514-407F-BB2B-262A2D17FE69", "versionEndExcluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D4E56C38-A3A8-42A0-B4A7-15C17D726BEC", "versionEndExcluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:remote_console:*:*:*:*:*:linux:*:*", "matchCriteriaId": "368E37EE-984D-4742-BB71-8877C09C8452", "versionEndExcluding": "10.0.5", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:remote_console:*:*:*:*:*:windows:*:*", "matchCriteriaId": "17581784-226A-4400-8FB3-CEC10BC8C1E3", "versionEndExcluding": "10.0.5", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DCA9649-CB58-49E9-B68D-76A878784EA1", "versionEndExcluding": "15.5.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E347C39A-CFFB-45F4-92B4-61239718DE7D", "versionEndExcluding": "11.5.0", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*", "matchCriteriaId": "0BC70488-A435-43BE-AEF4-30CBA36CBC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*", "matchCriteriaId": "2B37DC7D-A1C6-468F-A42E-160CE226FF7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201903001:*:*:*:*:*:*", "matchCriteriaId": "7B0A3263-193B-4725-BF20-08A2B2F3BB82", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201905001:*:*:*:*:*:*", "matchCriteriaId": "D6C6287E-C24E-4291-8DE7-4413993577F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201909001:*:*:*:*:*:*", "matchCriteriaId": "AA74FDE2-4656-446D-9215-77326C7EC62C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ESXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5." }, { "lang": "es", "value": "ESXi, Workstation, Fusion, VMRC y Horizon Client contienen una vulnerabilidad uso de la memoria previamente liberada en el dispositivo de sonido virtual. VMware ha evaluado la gravedad de este problema para estar en el rango de gravedad Importante con un puntaje base CVSSv3 m\u00e1ximo de 8.5." } ], "id": "CVE-2019-5527", "lastModified": "2024-11-21T04:45:07.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-10T17:15:18.467", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-11 14:29
Modified
2024-11-21 03:26
Severity ?
Summary
VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/102490 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040161 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0005.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102490 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040161 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0005.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | workstation | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EE84B0E-1550-4DE8-9454-AF2F51CDE208", "versionEndExcluding": "8.5.10", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7419FA0-119C-4C1C-A071-90A9F8ECDB32", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD8033E5-38A7-4262-8FB0-937534F4C41F", "versionEndExcluding": "12.5.9", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D13A3189-D26A-4F29-9C49-6083F5951B81", "versionEndExcluding": "14.1.1", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default." }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de desbordamiento de enteros en el servicio VMware NAT cuando el modo IPv6 est\u00e1 habilitado. Este problema podr\u00eda conducir a una lectura fuera de l\u00edmites, que podr\u00e1 utilizarse para ejecutar c\u00f3digo en el host en combinaci\u00f3n con otros problemas. Nota: El modo IPv6 para VMNAT no est\u00e1 habilitado por defecto." } ], "id": "CVE-2017-4950", "lastModified": "2024-11-21T03:26:44.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-11T14:29:00.260", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102490" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040161" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-784/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-784/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5. 5), contienen una vulnerabilidad de desbordamiento de la pila en el controlador USB 2.0 (EHCI). Un actor malicioso con acceso local a una m\u00e1quina virtual puede ser capaz de explotar esta vulnerabilidad para ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual. Unas condiciones adicionales m\u00e1s all\u00e1 del control del atacante deben estar presentes para que la explotaci\u00f3n pueda ser posible" } ], "id": "CVE-2020-3967", "lastModified": "2024-11-21T05:32:04.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.320", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-784/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-784/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/75092 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032529 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032530 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75092 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032529 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | horizon_client | 3.2.0 | |
vmware | horizon_client | 3.3 | |
vmware | horizon_view_client | 5.4 | |
vmware | horizon_view_client | 5.4.1 | |
microsoft | windows | * | |
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 6.0.5 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.0.1 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | player | 6.0.5 | |
vmware | player | 7.0 | |
vmware | player | 7.1 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | workstation | 10.0.5 | |
vmware | workstation | 11.0 | |
vmware | workstation | 11.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C7BA06B-60FB-456B-A4BF-401F82E88BBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E82AFF09-F9F6-486B-9299-3852EBD9B333", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9391EA21-2A10-445A-B88A-103025C9A343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "85A09E65-9C4C-42FD-A1B0-E925A905875A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7EF002E-10E1-4405-8C55-BD91AD45B891", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "93872771-BD86-4707-926B-F6C3577C33A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8903-B853-43A2-88C3-D79BBA70F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71B0563B-F300-448D-8450-9B7B862F4560", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "492D7AD2-D660-48F5-A9BE-28CCA6A6B658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "90F0250C-EE18-486B-90D7-348FEF01C2D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338." }, { "lang": "es", "value": "TPview.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado causar una denegaci\u00f3n de servicio del sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-2338." } ], "id": "CVE-2015-2339", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-13T14:59:02.873", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75092" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-10 14:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0017.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0017.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | horizon_client | * | |
vmware | remote_console | * | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "E98B45BA-6294-4215-99B2-D39BD862D3BE", "versionEndExcluding": "5.4.3", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:remote_console:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD1A9E46-94B2-42D9-BA5C-DAACB2676321", "versionEndExcluding": "11.2.0", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed." }, { "lang": "es", "value": "VMware Fusion (versiones 11.x anteriores a 11.5.5), VMware Remote Console para Mac (versiones 11.x y anteriores a 11.2.0) y Horizon Client para Mac (versiones 5.x y anteriores a 5.4.3), contienen una vulnerabilidad de escalada de privilegios debido a una comprobaci\u00f3n inapropiada del XPC Client. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a atacantes con privilegios de usuario normal escalar sus privilegios para rootear en el sistema donde est\u00e1 instalado Fusion, VMware Remote Console para Mac o Horizon Client para Mac" } ], "id": "CVE-2020-3974", "lastModified": "2024-11-21T05:32:05.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-10T14:15:10.483", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-29 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/62551 | ||
cve@mitre.org | http://www.securityfocus.com/bid/72337 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1031644 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0001.html | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/100934 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62551 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/72337 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1031644 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/100934 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 7.0 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors." }, { "lang": "es", "value": "Host Guest File System (HGFS) en VMware Workstation 10.x anterior a 10.0.5, VMware Player 6.x anterior a 6.0.5, y VMware Fusion 6.x anterior a 6.0.5 y 7.x anterior a 7.0.1 permite a usuarios del sistema operativo invitado causar una denegaci\u00f3n de servicio del sistema operativo invitado a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-1043", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-29T18:59:02.657", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72337" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031644" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-05 18:15
Modified
2025-05-07 15:37
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Summary
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | fusion | * | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D725D84-6426-459F-9B49-ADE7A13FA19A", "versionEndIncluding": "5.0", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0BFB423-5C6D-40F3-960A-53D9955E7621", "versionEndExcluding": "17.5.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*", "matchCriteriaId": "BC6F088D-0404-4588-9788-7A5903C5BC82", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50649AB8-57FD-4210-A7F4-3AD7D00F6A91", "versionEndExcluding": "13.5.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller.\u00a0A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.\u00a0\u00a0\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el controlador USB UHCI. Un actor malintencionado con acceso administrativo a una m\u00e1quina virtual puede aprovechar este problema para perder memoria del proceso vmx." } ], "id": "CVE-2024-22255", "lastModified": "2025-05-07T15:37:25.187", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-03-05T18:15:48.277", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-20 20:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0026.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0026.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | cloud_foundation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A6B06C7-49AA-4F09-B87F-A25D0202F5B1", "versionEndExcluding": "11.5.7", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "1995769A-1AB9-47FA-966A-8E82D414161E", "versionEndExcluding": "3.10.1.2", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "22C19FF0-3E38-4717-9044-092EF9C4C486", "versionEndExcluding": "15.5.7", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBD2E65C-08C3-4116-9CAD-B0764EB025C8", "versionEndExcluding": "4.1.0.1", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*", "matchCriteriaId": "C565246C-896C-4E48-8C24-344C9B0A3057", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*", "matchCriteriaId": "8479F377-4F47-433D-867D-A94A4B0E46EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202010001:*:*:*:*:*:*", "matchCriteriaId": "ECC2468D-6B23-4C7E-951B-DDA8DD17B51E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202011001:*:*:*:*:*:*", "matchCriteriaId": "2CB7210B-C9FC-41FA-A258-1F6EC737E9BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202011002:*:*:*:*:*:*", "matchCriteriaId": "3279299C-37AD-47DF-B22A-20562D13AD80", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", "matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", "matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", "matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", "matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", "matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", "matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", "matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", "matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", "matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", "matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", "matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", "matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", "matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", "matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", "matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", "matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", "matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", "matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", "matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", "matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", "matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", "matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", "matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", "matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", "matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201911001:*:*:*:*:*:*", "matchCriteriaId": "2130E67D-7F2A-4D82-BEFD-BA42B6B6FDA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", "matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*", "matchCriteriaId": "18E8632C-E442-4F18-BFE2-96AE5C839F0E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi70U1b-17168206, versiones 6.7 anteriores a ESXi670-202011101-SG, versiones 6.5 anteriores a ESXi650-202011301-SG), Workstation (versiones 15.x anteriores a 15.5.7), Fusion (versiones 11.x anteriores a 11.5.7), contienen una vulnerabilidad de uso de la memoria previamente liberada en el controlador USB XHCI.\u0026#xa0;Un actor malicioso con privilegios administrativos locales en una m\u00e1quina virtual puede explotar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host" } ], "id": "CVE-2020-4004", "lastModified": "2024-11-21T05:32:08.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-20T20:15:13.147", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-16 17:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2E41C3F-1DCF-445A-82C4-C7C8FC225C40", "versionEndExcluding": "12.0.0", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed." }, { "lang": "es", "value": "VMware Fusion (versi\u00f3n 11.x), contiene una vulnerabilidad de escalamiento de privilegios debido a la forma en que permite configurar la ruta amplia del sistema.\u0026#xa0;Un atacante con privilegios de usuario normales puede ser capaz de explotar este problema para enga\u00f1ar a un usuario administrador para que ejecute c\u00f3digo malicioso en el sistema donde est\u00e1 instalado Fusion" } ], "id": "CVE-2020-3980", "lastModified": "2024-11-21T05:32:06.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-16T17:15:13.827", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.6, and VMware Fusion 6.x before 6.0.6 and 7.x before 7.0.1 allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS via a crafted RPC command.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/75094 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032530 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75094 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 6.0.5 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.0.1 | |
vmware | fusion | 7.1.0 | |
vmware | fusion | 7.1.1 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | player | 6.0.5 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "85A09E65-9C4C-42FD-A1B0-E925A905875A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7EF002E-10E1-4405-8C55-BD91AD45B891", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "665657BA-143E-4873-9FFC-B984445D7266", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2C9E4C16-838C-4302-A4E7-A79878070519", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.6, and VMware Fusion 6.x before 6.0.6 and 7.x before 7.0.1 allow attackers to cause a denial of service against a 32-bit guest OS or 64-bit host OS via a crafted RPC command." }, { "lang": "es", "value": "VMware Workstation 10.x anterior a 10.0.5, VMware Player 6.x anterior a 6.0.6, y VMware Fusion 6.x anterior a 6.0.6 y 7.x anterior a 7.0.1 permiten a atacantes causar una denegaci\u00f3n de servicio sobre un sistema operativo invitado de 32 bits o sobre un sistema operativo anfitri\u00f3n de 64 bits a trav\u00e9s de un comando RPC manipulado." } ], "id": "CVE-2015-2341", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-13T14:59:04.637", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75094" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-16 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2009/000066.html | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/36928 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1022981 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0013.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/2811 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2009/000066.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36928 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1022981 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0013.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2811 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8A8DAA7-1031-4F9A-8E53-9F675EF193A6", "versionEndIncluding": "2.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "942B4ED3-A68E-4106-A98B-FA7CD3505140", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DD1338C-8FC1-40A1-BAE8-B11F4354A0CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC862199-8AA7-4E5E-BA2B-DF5FC9A056BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BDA2CE1-E26E-4347-BD60-2764A19F5E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B503A45-D9F3-414D-9BFA-C58B1E81A39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 does not use correct file permissions, which allows host OS users to gain privileges on the host OS via unspecified vectors." }, { "lang": "es", "value": "La extensi\u00f3n del n\u00facleo vmx86 en VMware Fusion v2.0.6 anterior a build 196839 no utiliza los permisos de archivo correctos, lo cual permite a los usuarios del sistema operativo anfitrion obtener privilegios en el sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2009-3281", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-10-16T16:30:00.670", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36928" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022981" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2811" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-20 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securitytracker.com/id/1040024 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040025 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0021.html | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040024 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040025 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0021.html | Issue Tracking, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | workstation | * | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "20740117-8BC1-47B8-AA10-8ADF91F1CA86", "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "133DFB76-70D7-4480-B409-2A657DF3B6AD", "versionEndExcluding": "12.5.8", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:550-20170901001s:*:*:*:*:*:*", "matchCriteriaId": "45551873-2E14-4324-9946-C22079F7D0D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:550-20170904001:*:*:*:*:*:*", "matchCriteriaId": "5D578101-DDC8-4A23-9FDC-259802D1895F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\u0027s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall." }, { "lang": "es", "value": "VMware ESXi (6.0 anteriores a ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x anteriores a la 12.5.8) y Fusion (8.x anteriores a la 8.5.9) contienen una vulnerabilidad que podr\u00eda permitir que una sesi\u00f3n VNC autenticada provoque un desbordamiento de pila mediante una serie espec\u00edfica de paquetes VNC. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda resultar en la ejecuci\u00f3n remota de c\u00f3digo en una m\u00e1quina virtual mediante la sesi\u00f3n VNC autenticada. Nota: Para que sea posible la explotaci\u00f3n en ESXi, VNC debe estar habilitado manualmente en un archivo de configuraci\u00f3n .vmx de la m\u00e1quina virtual. Adem\u00e1s, ESXi se debe configurar para permitir el tr\u00e1fico VNC a trav\u00e9s del firewall incorporado." } ], "id": "CVE-2017-4941", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-20T15:29:00.297", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040024" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040025" }, { "source": "security@vmware.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-10 17:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E347C39A-CFFB-45F4-92B4-61239718DE7D", "versionEndExcluding": "11.5.0", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DCA9649-CB58-49E9-B68D-76A878784EA1", "versionEndExcluding": "15.5.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7." }, { "lang": "es", "value": "VMware Workstation y Fusion, contienen una vulnerabilidad de denegaci\u00f3n de servicio de red debido al manejo inapropiado de ciertos paquetes IPv6. VMware ha evaluado la gravedad de este problema para estar en el rango de gravedad Moderada con un puntaje base CVSSv3 m\u00e1ximo de 4.7." } ], "id": "CVE-2019-5535", "lastModified": "2024-11-21T04:45:08.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-10T17:15:18.530", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0014.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-29 01:44
Modified
2025-06-10 19:33
Severity ?
5.9 (Medium) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device). A malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "A60E064C-3C0F-48EF-B650-41601571B3A1", "versionEndExcluding": "17.5.1", "versionStartIncluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50649AB8-57FD-4210-A7F4-3AD7D00F6A91", "versionEndExcluding": "13.5.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device).\u00a0A malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de lectura fuera de los l\u00edmites en el CCID USB (dispositivo de interfaz de tarjeta chip). Un actor malicioso con privilegios administrativos locales en una m\u00e1quina virtual puede desencadenar una lectura fuera de los l\u00edmites que conduzca a la divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2024-22251", "lastModified": "2025-06-10T19:33:10.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-29T01:44:05.870", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-17 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/102197 | ||
cve@mitre.org | http://secunia.com/advisories/56499 | ||
cve@mitre.org | http://www.securityfocus.com/bid/64994 | ||
cve@mitre.org | http://www.securitytracker.com/id/1029643 | ||
cve@mitre.org | http://www.securitytracker.com/id/1029644 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2014-0001.html | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/90558 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/102197 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56499 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/64994 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029643 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029644 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2014-0001.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/90558 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.1 | |
vmware | fusion | 5.0 | |
vmware | player | 5.0 | |
vmware | workstation | 9.0 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EEF165A-4E09-4FF0-A577-FF429BCCF588", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "364FBB12-E292-47BB-8D26-CED34232A135", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B439F706-27F8-4238-9396-B460EB78B6DC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port." }, { "lang": "es", "value": "VMware Workstation 9.x anteriores a 9.0.1, WMware Player 5.x anteriores a 5.0.1, VMware Fusion 5.x anteriores a 5.0.1, VMware ESXi 4.0 hasta 5.1, y WMware ESX 4.0 y 4.1 permite a usuarios invitado del sistema causar una denegaci\u00f3n de servicio (ruptura de proceso VMX) utilizando un puerto inv\u00e1lido." } ], "id": "CVE-2014-1208", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-17T21:55:19.690", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/102197" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/56499" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/64994" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029643" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029644" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0001.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/102197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90558" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/75095 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032529 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032530 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75095 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032529 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 6.0.5 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.0.1 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | player | 6.0.5 | |
vmware | player | 7.0 | |
vmware | player | 7.1 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | workstation | 10.0.5 | |
vmware | workstation | 11.0 | |
vmware | workstation | 11.1 | |
vmware | horizon_client | 3.2.0 | |
vmware | horizon_client | 3.3 | |
vmware | horizon_view_client | 5.4 | |
vmware | horizon_view_client | 5.4.1 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "85A09E65-9C4C-42FD-A1B0-E925A905875A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7EF002E-10E1-4405-8C55-BD91AD45B891", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "93872771-BD86-4707-926B-F6C3577C33A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8903-B853-43A2-88C3-D79BBA70F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71B0563B-F300-448D-8450-9B7B862F4560", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "492D7AD2-D660-48F5-A9BE-28CCA6A6B658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "90F0250C-EE18-486B-90D7-348FEF01C2D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C7BA06B-60FB-456B-A4BF-401F82E88BBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E82AFF09-F9F6-486B-9299-3852EBD9B333", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9391EA21-2A10-445A-B88A-103025C9A343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors." }, { "lang": "es", "value": "TPInt.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-2337", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-13T14:59:00.997", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75095" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-14 16:16
Modified
2025-03-14 15:15
Severity ?
9.3 (Critical) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "373FFB23-C9E8-495D-BD27-6DC875887440", "versionEndExcluding": "13.5.2", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA567E5A-412F-4ED3-9434-E0290CDF753F", "versionEndExcluding": "17.5.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\n\n" }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de use-after-free en el dispositivo vbluetooth. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host." } ], "id": "CVE-2024-22267", "lastModified": "2025-03-14T15:15:39.803", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 6.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-14T16:16:06.610", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-05 20:32
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/30556 | Third Party Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | Third Party Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/3922 | Third Party Advisory | |
cve@mitre.org | http://securitytracker.com/id?1020200 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/archive/1/493080/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/29552 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2008-0009.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1744 | Permissions Required | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/42872 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081 | Third Party Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30556 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3922 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1020200 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493080/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29552 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0009.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1744 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/42872 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | ace | * | |
vmware | ace | * | |
vmware | esx_server | 3.0 | |
vmware | esx_server | 3.5 | |
vmware | esxi | 3.5 | |
vmware | fusion | * | |
vmware | player | * | |
vmware | player | * | |
vmware | server | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esx | 2.5.4 | |
vmware | esx | 2.5.5 | |
vmware | esx | 3.0.0 | |
vmware | esx | 3.0.1 | |
vmware | esx | 3.0.2 | |
vmware | esx | 3.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "matchCriteriaId": "C67E8ABD-4BC9-4A68-A1A8-517574B54FBB", "versionEndIncluding": "1.0.5", "versionStartIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B407FC-39E6-4504-AA38-28F45B10B462", "versionEndIncluding": "2.0.3", "versionStartIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3BE184CF-CD55-4F32-9294-A680A4DD3870", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "16EFF4E2-CA32-4FA4-AC4B-82D8C50769D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5AE1C86-62E7-470E-BB1B-1AAEE3192D91", "versionEndIncluding": "1.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "matchCriteriaId": "093FA9F6-A59D-4C09-B133-002573AB05BA", "versionEndIncluding": "1.0.6", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "matchCriteriaId": "318E110E-C2E3-4332-BD84-7ABBFBF2309B", "versionEndIncluding": "2.0.3", "versionStartIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEC0931F-7BB8-4CFD-9533-A62367661810", "versionEndIncluding": "1.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E456E5A-C2F5-4FA1-94F0-2BBD81A766D5", "versionEndIncluding": "5.5.6", "versionStartIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "40ED2686-C461-4C16-A50F-D56E369879CC", "versionEndIncluding": "6.0.3", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA6DF4-4D53-482A-8820-B9B0E6EBD51D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "ECFD8D25-7FDF-48DF-8728-5875C44FFB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "974D84A6-F5AB-4F0A-B9B5-9095A0E4733C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C3613B7-CA1B-4C9A-9076-A2894202DDA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE7ECF1C-285C-4AA3-8B66-28EDAB0763E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29100-E124-4416-95CF-18B4246D43F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer en VIX API 1.1.x anteriores a 1.1.4 build 93057 en VMware Workstation 5.x y 6.x, VMware Player 1.x y 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, y VMware ESX 3.0.1 hasta la 3.5, permite a los usuarios del sistema hu\u00e9sped, ejecutar c\u00f3digo arbitrario en el sistema anfitri\u00f3n a trav\u00e9s de vectores no espec\u00edficos.\r\n" } ], "id": "CVE-2008-2100", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-05T20:32:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30556" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3922" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29552" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/1744" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/1744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-14 16:16
Modified
2025-06-27 13:36
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA567E5A-412F-4ED3-9434-E0290CDF753F", "versionEndExcluding": "17.5.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "373FFB23-C9E8-495D-BD27-6DC875887440", "versionEndExcluding": "13.5.2", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality.\u00a0A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.\n\n" }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la funcionalidad Host Guest File Sharing (HGFS). Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede leer informaci\u00f3n privilegiada contenida en la memoria del hipervisor desde una m\u00e1quina virtual." } ], "id": "CVE-2024-22270", "lastModified": "2025-06-27T13:36:04.077", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-14T16:16:12.613", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-17 14:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/101903 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1039835 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0018.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101903 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039835 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0018.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 12.0.0 | |
vmware | workstation | 12.0.1 | |
vmware | workstation | 12.1 | |
vmware | workstation | 12.1.1 | |
vmware | workstation | 12.5 | |
vmware | workstation | 12.5.1 | |
vmware | workstation | 12.5.2 | |
vmware | workstation | 12.5.3 | |
vmware | workstation | 12.5.4 | |
vmware | workstation | 12.5.5 | |
vmware | workstation | 12.5.6 | |
vmware | workstation | 12.5.7 | |
vmware | fusion | 8.0.0 | |
vmware | fusion | 8.0.1 | |
vmware | fusion | 8.0.2 | |
vmware | fusion | 8.1.0 | |
vmware | fusion | 8.1.1 | |
vmware | fusion | 8.5.0 | |
vmware | fusion | 8.5.1 | |
vmware | fusion | 8.5.2 | |
vmware | fusion | 8.5.3 | |
vmware | fusion | 8.5.4 | |
vmware | fusion | 8.5.5 | |
vmware | fusion | 8.5.6 | |
vmware | fusion | 8.5.7 | |
vmware | fusion | 8.5.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C2CB0-9A2B-46B2-9E75-2BADAE722BB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D38FB28D-8A42-4877-92AF-39EE04B14DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "180E48AF-AD42-4A00-948A-9C1D70BE53F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "66C64A90-90A2-450A-8A79-AB69B5A939DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE6B9B4F-53C5-4B47-89C4-AD221DC91D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E293B67-98C3-4D8E-883C-2F2F774AE6F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AB307F39-3A90-4B62-B2BF-0E0CEBBBBC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "838C7C08-15ED-4379-8A5B-9419D13AE7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C064187-0870-4672-9D64-92D643FA9C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "60F08698-0194-4892-9A46-93C53C0C660B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "287275D4-E311-4A1B-BC5C-2FB3A64691E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "ED552760-4DB1-4E56-B6C1-23E053858055", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "25BBD4C7-C851-4D40-B6DD-92873319CD28", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDD345B3-810C-41D1-82CE-0CA0B4B1F5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "768A4D3B-CC19-4A3A-91D5-9C974F7F0247", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5D443-A330-40DF-939B-10597147CE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "42BF8A2A-295D-44D6-A38E-D4C35437F380", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC08D3D5-5D46-45C7-BD43-81E1D18FAB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "574DB25B-51E1-466A-8089-5108DB5D6FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0BF7F09F-D8B3-40AF-9111-E7C14832C5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "555DD10F-7EA8-4107-A31F-2C7CED41058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "7EE4888B-156C-48BC-8035-3A0424CB6037", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "6D4DA202-3D18-4DDC-89E4-81FFF68EDFD0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (12.x before 12.5.8) and Fusion (8.x before 8.5.9) contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware Workstation (en versiones 12.x anteriores a la 12.5.8) y Fusion (en versiones 8.x anteriores a la 8.5.9) contienen una vulnerabilidad de desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en el dispositivo VMNAT. Este problema puede permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2017-4934", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-17T14:29:00.547", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101903" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039835" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0018.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-27 17:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5) contain an integer overflow vulnerability in the virtual network devices. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/105986 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0030.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105986 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0030.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | workstation | * | |
vmware | fusion | * | |
vmware | fusion | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7F101F9-ED67-4B5E-81E7-8D0927313521", "versionEndExcluding": "14.1.5", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "00FC06EC-9846-491F-9FB6-B79C5276F90D", "versionEndExcluding": "15.0.2", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "4026300B-10EA-4FFE-8102-3896E6D0CF1F", "versionEndExcluding": "10.1.5", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DEC340C-6848-4ABC-8A3E-3E9B80F4B4EC", "versionEndExcluding": "11.0.2", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.0.2 and 14.x before 14.1.5) and Fusion (11.x before 11.0.2 and 10.x before 10.1.5) contain an integer overflow vulnerability in the virtual network devices. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware Workstation (versiones 15.x anteriores a la 15.0.2 y versiones 14.x anteriores a la 14.1.5) y Fusion (versiones 11.x anteriores a la 11.0.2 y versiones 10.x anteriores a la 10.1.5) contiene una vulnerabilidad de desbordamiento de enteros en los dispositivos de red virtuales. Este problema podr\u00eda permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2018-6983", "lastModified": "2024-11-21T04:11:31.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-27T17:29:00.697", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105986" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0030.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-04 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/81695 | ||
cve@mitre.org | http://secunia.com/advisories/49032 | ||
cve@mitre.org | http://www.securityfocus.com/bid/53369 | ||
cve@mitre.org | http://www.securitytracker.com/id?1027019 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2012-0009.html | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/75377 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/81695 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49032 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53369 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027019 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2012-0009.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75377 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 8.0 | |
vmware | workstation | 8.0.1 | |
vmware | workstation | 8.0.2 | |
vmware | player | 4.0 | |
vmware | player | 4.0.1 | |
vmware | player | 4.0.2 | |
vmware | fusion | 4.0 | |
vmware | fusion | 4.0.1 | |
vmware | fusion | 4.0.2 | |
vmware | fusion | 4.1 | |
vmware | fusion | 4.1.1 | |
vmware | esxi | 3.5 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "60234129-7F7F-49FA-A425-CDAB4D09AB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4FB73EC4-F3CE-428B-BA40-47FB21181543", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "927863C2-5A61-4137-83AC-6CF3F2958941", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F74559CB-6E52-421F-88F3-739913C26C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4870DAA2-6670-47EF-BF74-6E39B92E75DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FAE88D8C-9CC3-46D1-9F26-290BC679F47E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*", "matchCriteriaId": "58ED8AB4-0FDF-4752-B44E-56F58593CE41", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29100-E124-4416-95CF-18B4246D43F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*", "matchCriteriaId": "37A5D726-3D38-44D5-B509-1B8B003903A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*", "matchCriteriaId": "A4DA3B20-A743-4F37-A095-65161FFBEB73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*", "matchCriteriaId": "FF7C3C65-BE63-407E-9CFD-E571025C3E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly register SCSI devices, which allows guest OS users to cause a denial of service (invalid write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS." }, { "lang": "es", "value": "VMware Workstation v8.x antes de v8.0.3, VMware Player v4.x antes de v4.0.3 VMware Fusion v4.x, antes de v4.1.2, VMware ESXi v3.5 hasta v5.0 y VMware ESX v3.5 hasta v4.1 no registra correctamente los dispositivos SCSI, lo que permite a los usuarios invitados del sistema operativo causar una denegaci\u00f3n de servicio (operaci\u00f3n de escritura no v\u00e1lida y ca\u00edda del proceso VMX) o posiblemente ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n mediante el aprovechamiento de privilegios de administrador en el sistema operativo invitado." } ], "id": "CVE-2012-2450", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-04T16:55:01.577", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/81695" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/49032" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53369" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027019" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75377" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/81695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-21 18:15
Modified
2025-03-26 16:15
Severity ?
8.1 (High) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | fusion | * | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6C5CFA-E78F-46EA-B8E0-8AE2A29C9586", "versionEndExcluding": "5.1.1", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0BFB423-5C6D-40F3-960A-53D9955E7621", "versionEndExcluding": "17.5.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*", "matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50649AB8-57FD-4210-A7F4-3AD7D00F6A91", "versionEndExcluding": "13.5.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability.\u00a0A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues." }, { "lang": "es", "value": "Los controladores de almacenamiento en VMware ESXi, Workstation y Fusion tienen una vulnerabilidad de lectura/escritura fuera de los l\u00edmites. Un actor malintencionado con acceso a una m\u00e1quina virtual con controladores de almacenamiento habilitados puede aprovechar este problema para crear una condici\u00f3n de denegaci\u00f3n de servicio o ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual junto con otros problemas." } ], "id": "CVE-2024-22273", "lastModified": "2025-03-26T16:15:19.423", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 6.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-21T18:15:08.993", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-06 21:05
Modified
2025-04-11 00:51
Severity ?
Summary
The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a "command injection" issue.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000112.html | ||
cve@mitre.org | http://osvdb.org/69590 | ||
cve@mitre.org | http://secunia.com/advisories/42480 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/42482 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/514995/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/45166 | ||
cve@mitre.org | http://www.securitytracker.com/id?1024819 | ||
cve@mitre.org | http://www.securitytracker.com/id?1024820 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0018.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2010/3116 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000112.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/69590 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42480 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42482 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514995/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45166 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024819 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024820 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0018.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3116 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 6.5.0 | |
vmware | workstation | 6.5.1 | |
vmware | workstation | 6.5.2 | |
vmware | workstation | 6.5.3 | |
vmware | workstation | 6.5.5 | |
vmware | workstation | 7.0 | |
vmware | workstation | 7.0.1 | |
vmware | workstation | 7.1 | |
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
vmware | player | 2.5 | |
vmware | player | 2.5.1 | |
vmware | player | 2.5.2 | |
vmware | player | 2.5.3 | |
vmware | player | 2.5.4 | |
vmware | player | 2.5.5 | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | fusion | 2.0.3 | |
vmware | fusion | 2.0.4 | |
vmware | fusion | 2.0.5 | |
vmware | fusion | 2.0.6 | |
vmware | fusion | 2.0.7 | |
vmware | fusion | 2.0.8 | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
vmware | server | 2.0.2 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A172221-19AB-4F7D-AA28-94AD5A6EFBF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34F436D4-B7B7-43CB-A2BD-C5E791F7E3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF53DB66-4C79-47BB-AABD-6DCE2EF98E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "656039E8-8082-4208-B046-518D95769B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "80003D5E-B63F-4635-94ED-706375A4F86F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6C47EB8-8844-4D49-9246-008F7AE45C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "8C27806A-7AC9-4B7A-97EA-602FDB1C96CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "90CA88D9-52D8-4365-9DEB-7FB36A6A86A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": false } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "73C9E205-87EE-4CE2-A252-DED7BB6D4EAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The VMware Tools update functionality in VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548; VMware Player 2.5.x before 2.5.5 build 328052 and 3.1.x before 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x before 2.0.8 build 328035 and 3.1.x before 3.1.2 build 332101; VMware ESXi 3.5, 4.0, and 4.1; and VMware ESX 3.0.3, 3.5, 4.0, and 4.1 allows host OS users to gain privileges on the guest OS via unspecified vectors, related to a \"command injection\" issue." }, { "lang": "es", "value": "La funcionalidad actualizar de VMware Tools en VMware Workstation 6.5.x anteriores a la 6.5.5 build 328052 y 7.x anteriores a la 7.1.2 build 301548; VMware Player 2.5.x anteriores a la 2.5.5 build 328052 y 3.1.x anteriores a la 3.1.2 build 301548; VMware Server 2.0.2; VMware Fusion 2.x anteriores a la 2.0.8 build 328035 y 3.1.x anteriores a la 3.1.2 build 332101; VMware ESXi 3.5, 4.0, y 4.1; y VMware ESX 3.0.3, 3.5, 4.0, y 4.1 permite a los usuarios del SO base escalar privilegios en el SO invitado a trav\u00e9s de vectores sin especificar. Relacionado con inyecciones de comandos." } ], "id": "CVE-2010-4297", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-12-06T21:05:49.483", "references": [ { "source": "cve@mitre.org", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/69590" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42480" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42482" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45166" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024819" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024820" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/69590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3116" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-15 17:29
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762 | Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0006.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7A2CFA-E5C0-49F9-8E60-0965AEBE364D", "versionEndExcluding": "14.1.6", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D75366-3750-458A-BAF4-6DC91CC08948", "versionEndExcluding": "15.0.3", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." }, { "lang": "es", "value": "La actualizaciones de VMware ESXi (versiones 6.7 anteriores a ESXi670-201904101-SG y 6.5 anteriores a ESXi650-201903001), Workstation (versiones 15.x anteriores a 15.0.3 y 14.x anteriores a 14.1.6), Fusion (versiones 11.x anteriores a 11.0.3 y 10.x anteriores a 10.1.6) abordan una vulnerabilidad de fuera de l\u00edmites con la funcionalidad vertex shader. La explotaci\u00f3n de este problema requiere que un atacante tenga acceso a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados. La explotaci\u00f3n exitosa de este problema puede conducir a la divulgaci\u00f3n de informaci\u00f3n o puede permitir a los atacantes con privilegios de usuario normales crear una condici\u00f3n de denegaci\u00f3n de servicio en su propia m\u00e1quina virtual. La soluci\u00f3n a este problema consiste en desactivar la funci\u00f3n de aceleraci\u00f3n 3D. Esta funci\u00f3n no est\u00e1 activada de forma predeterminada en ESXi y est\u00e1 activada de forma predeterminada en Workstation y Fusion." } ], "id": "CVE-2019-5516", "lastModified": "2024-11-21T04:45:05.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-15T17:29:00.580", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-09 20:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi (6.7, 6.5, 6.0), Workstation (15.x and 14.x) and Fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3D-rendering shader. Successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the VM unresponsive, and in some cases, possibly result other VMs on the host or the host itself becoming unresponsive.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/105549 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041821 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041822 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0025.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105549 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041821 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041822 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0025.html | Mitigation, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC77ADEA-F0B8-4E5D-B965-39397F823075", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "48DD549A-3C39-4B9C-A987-2FA5560D211D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E46E541-E81C-4EED-B49E-BD2F84196FBF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "27CAA5CB-9E7D-4B6A-AD59-E282A45799B4", "versionEndIncluding": "14.1.5", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3753D0D3-A091-42E0-A600-3DF010704151", "versionEndIncluding": "15.0.2", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0C9A5B6-C197-4E9D-91CC-AE0C20872691", "versionEndIncluding": "10.1.5", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AA7E4D8-7C45-421A-B120-60C79003D171", "versionEndIncluding": "11.0.2", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7, 6.5, 6.0), Workstation (15.x and 14.x) and Fusion (11.x and 10.x) contain a denial-of-service vulnerability due to an infinite loop in a 3D-rendering shader. Successfully exploiting this issue may allow an attacker with normal user privileges in the guest to make the VM unresponsive, and in some cases, possibly result other VMs on the host or the host itself becoming unresponsive." }, { "lang": "es", "value": "VMware ESXi (6.7, 6.5, 6.0), Workstation (15.x y 14.x) y Fusion (11.x y 10.x) contienen una vulnerabilidad de denegaci\u00f3n de servicio (DoS) debido a un bucle infinito en un shader de renderizado 3D. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir que un atacante con privilegios de usuario normales en el invitado haga que la m\u00e1quina virtual deje de responder y, en algunos casos, haga que otras m\u00e1quinas virtuales en el host o el propio host se vuelvan inoperativos." } ], "id": "CVE-2018-6977", "lastModified": "2024-11-21T04:11:31.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-09T20:29:01.667", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105549" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041821" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041822" }, { "source": "security@vmware.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0025.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-09 20:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6967.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/104709 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041208 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0016.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104709 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041208 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0016.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C4E179-64D8-44F4-A60E-2C67268669C1", "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CD4990A-14DD-414B-8946-680D7BF5D29E", "versionEndExcluding": "14.1.2", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6967." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7, anteriores a ESXi670-201806401-BG), Workstation (versiones 14.x, anteriores a la 14.1.2) y Fusion (versiones 10.x, anteriores a la 10.1.2) contienen una vulnerabilidad de lectura fuera de l\u00edmites en el traductor del shader. Si este error se explota de manera exitosa, podr\u00eda dar lugar a una divulgaci\u00f3n de informaci\u00f3n o podr\u00eda permitir que atacantes con privilegios de usuario normal provoquen el cierre inesperado de sus m\u00e1quinas virtuales. Esta vulnerabilidad es diferente de CVE-2018-6965 y CVE-2018-6967." } ], "id": "CVE-2018-6966", "lastModified": "2024-11-21T04:11:29.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-09T20:29:01.067", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104709" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041208" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-25 13:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/104884 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041356 | Broken Link, Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041357 | Broken Link, Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0018.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104884 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041356 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041357 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0018.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CD4990A-14DD-414B-8946-680D7BF5D29E", "versionEndExcluding": "14.1.2", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C4E179-64D8-44F4-A60E-2C67268669C1", "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "matchCriteriaId": "4DC223AC-EB3D-48CF-A6CC-D35E00A38394", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "matchCriteriaId": "75C8E87E-A869-49F8-89F9-DE64A45CDB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "matchCriteriaId": "E7F8878C-F73D-4549-9607-74880176D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "matchCriteriaId": "E47D369F-13B2-42B3-BB74-60AAD0954B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:550-20170901001s:*:*:*:*:*:*", "matchCriteriaId": "45551873-2E14-4324-9946-C22079F7D0D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:550-20170904001:*:*:*:*:*:*", "matchCriteriaId": "5D578101-DDC8-4A23-9FDC-259802D1895F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-201806401-BG, versiones 6.5 anteriores a ESXi650-201806401-BG, versiones 6.0 anteriores a ESXi600-201806401-BG y versiones 5.5 anteriores a ESXi550-201806401-BG), Workstation (versiones 14.x anteriores a la 14.1.2) y Fusion (versiones 10.x anteriores a la 10.1.2) contienen una vulnerabilidad de denegaci\u00f3n de servicio (DoS) debido a un problema de desreferencia de puntero NULL en el manipulador RPC. La explotaci\u00f3n exitosa de este problema podr\u00eda permitir que atacantes con privilegios de usuario normal cierren inesperadamente sus m\u00e1quinas virtuales." } ], "id": "CVE-2018-6972", "lastModified": "2024-11-21T04:11:30.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-25T13:29:00.347", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104884" }, { "source": "security@vmware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041356" }, { "source": "security@vmware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041357" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-10-07 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in VMware Workstation 7.x before 7.1.5, VMware Player 3.x before 3.1.5, VMware Fusion 3.1.x before 3.1.3, and VMware AMS allows remote attackers to execute arbitrary code via a crafted UDF filesystem in an ISO image.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/76060 | ||
cve@mitre.org | http://secunia.com/advisories/46241 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/520005/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/49942 | ||
cve@mitre.org | http://www.securitytracker.com/id?1026139 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2011-0011.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/76060 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/46241 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/520005/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/49942 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026139 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0011.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.0 | |
vmware | workstation | 7.0.1 | |
vmware | workstation | 7.1 | |
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
vmware | workstation | 7.1.3 | |
vmware | workstation | 7.1.4 | |
vmware | player | 3.0 | |
vmware | player | 3.0.1 | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
vmware | player | 3.1.3 | |
vmware | player | 3.1.4 | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
vmware | ams | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34F436D4-B7B7-43CB-A2BD-C5E791F7E3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF53DB66-4C79-47BB-AABD-6DCE2EF98E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C8C76F3-05B5-43EA-AE70-A026AC6001DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F747AC1-E163-41A4-BAC7-FDF46F4057D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A115959-9CDA-45ED-9002-BA1A31074E81", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DAA72ED8-3229-4220-BE75-712CA6E21062", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57E06DA2-CB18-45E6-9F88-B3B6E0507816", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ams:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD09C110-3A8B-41F1-B113-854A914DB263", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in VMware Workstation 7.x before 7.1.5, VMware Player 3.x before 3.1.5, VMware Fusion 3.1.x before 3.1.3, and VMware AMS allows remote attackers to execute arbitrary code via a crafted UDF filesystem in an ISO image." }, { "lang": "es", "value": "Desbordamiento de bufer en VMware Workstation 7.x anterior a v7.1.5, VMware Player v3.x anterior a v3.1.5, VMware Fusion v3.1.x anterior v3.1.3, y VMware AMS permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un systema de ficheros manipulado UDF en una imagen ISO" } ], "id": "CVE-2011-3868", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-10-07T20:55:01.253", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/76060" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/46241" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/520005/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/49942" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1026139" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/76060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/520005/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49942" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0011.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-07 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/97165 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97165 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion_pro | * | |
apple | mac_os_x | - | |
vmware | workstation_player | * | |
vmware | workstation_pro | * | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1671-5010-4BB5-BFA7-217FBB946B59", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3E0004-E6F1-4C0D-9B24-A7F1AF4BCBD8", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB0B91B-F8F6-456F-8FBD-7B98A9ABA95A", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F1AB0A-CD31-4FE7-AE1F-4C6A111D1C62", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "matchCriteriaId": "4DC223AC-EB3D-48CF-A6CC-D35E00A38394", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "matchCriteriaId": "75C8E87E-A869-49F8-89F9-DE64A45CDB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "matchCriteriaId": "E7F8878C-F73D-4549-9607-74880176D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "matchCriteriaId": "E47D369F-13B2-42B3-BB74-60AAD0954B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5." }, { "lang": "es", "value": "El controlador XHCI en ESXi versiones 6.5 sin parche ESXi650-201703410-SG, 6.0 U3 sin parche ESXi600-201703401-SG, 6.0 U2 sin parche ESXi600-201703403-SG, 6.0 U1 sin parche ESXi600-201703402-SG, y 5.5 sin parche ESXi550 -201703401-SG; Workstation Pro / Player versiones 12.x anteriores a 12.5.5; y Fusion Pro / Fusion versiones 8.x anteriores a 8.5.6 de VMware, presenta un uso de memoria no inicializada. Este problema puede permitir a un invitado ejecutar c\u00f3digo en el host. El problema es reducido a una Denegaci\u00f3n de Servicio del invitado en ESXi versi\u00f3n 5.5." } ], "id": "CVE-2017-4904", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-07T18:29:00.397", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97165" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-29 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN88252465/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://secunia.com/advisories/62551 | ||
cve@mitre.org | http://secunia.com/advisories/62605 | ||
cve@mitre.org | http://secunia.com/advisories/62669 | ||
cve@mitre.org | http://www.securityfocus.com/bid/72338 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1031642 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1031643 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0001.html | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/100933 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN88252465/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62551 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62605 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62669 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/72338 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1031642 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1031643 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/100933 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.1 | |
vmware | esxi | 5.1 | |
vmware | esxi | 5.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*", "matchCriteriaId": "9A405802-D786-46F9-9E29-C727F9FD480A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "469D98A5-7B8B-41BE-94C6-D6EF25388007", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file." }, { "lang": "es", "value": "VMware Workstation 10.x anterior a 10.0.5, VMware Player 6.x anterior a 6.0.5, VMware Fusion 6.x anterior a 6.0.5, y VMware ESXi 5.0 hasta 5.5 permiten a usuarios del sistema operativo anfitri\u00f3n ganar privilegios del sistema operativo anfitri\u00f3n o causar una denegaci\u00f3n de servicio (escritura arbitraria a un fichero) mediante la modificaci\u00f3n de un fichero de configuraci\u00f3n." } ], "id": "CVE-2014-8370", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-29T18:59:00.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN88252465/index.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62551" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62605" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62669" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72338" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031642" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031643" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN88252465/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-14 16:16
Modified
2025-03-27 15:15
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Summary
VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality. A malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA567E5A-412F-4ED3-9434-E0290CDF753F", "versionEndExcluding": "17.5.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "373FFB23-C9E8-495D-BD27-6DC875887440", "versionEndExcluding": "13.5.2", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality.\u00a0A malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.\n\n" }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en la funcionalidad Shader. Un actor malintencionado con acceso no administrativo a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados puede aprovechar esta vulnerabilidad para crear una condici\u00f3n de denegaci\u00f3n de servicio." } ], "id": "CVE-2024-22268", "lastModified": "2025-03-27T15:15:49.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-14T16:16:07.643", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-04 18:56
Modified
2025-04-11 00:51
Severity ?
Summary
lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.1 | |
vmware | workstation | 9.0 | |
vmware | workstation | 9.0.1 | |
vmware | workstation | 9.0.2 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 | |
vmware | player | 5.0 | |
vmware | player | 5.0.1 | |
vmware | player | 5.0.2 | |
vmware | fusion | 5.0 | |
vmware | fusion | 5.0.1 | |
vmware | fusion | 5.0.2 | |
vmware | fusion | 5.0.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B439F706-27F8-4238-9396-B460EB78B6DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B87CF2A3-422B-4B5C-9E90-382FF6373F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6BF4A5B6-C3E5-47B4-BC9E-14F544E3393E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "364FBB12-E292-47BB-8D26-CED34232A135", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEBF8C7B-7034-47B4-B84A-6987EB7B4DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "277B926D-C575-4526-9F0C-A1D6EAF2AA2D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EEF165A-4E09-4FF0-A577-FF429BCCF588", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDC22BC2-DC74-4322-929C-7F82C083C1C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B8954CF-E90D-4C6C-ACCE-4A2B24B7BB1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF942219-A2F4-4ABC-8356-3626A9898075", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lgtosync.sys in VMware Workstation 9.x before 9.0.3, VMware Player 5.x before 5.0.3, VMware Fusion 5.x before 5.0.4, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1, when a 32-bit Windows guest OS is used, allows guest OS users to gain guest OS privileges via an application that performs a crafted memory allocation." }, { "lang": "es", "value": "Igtosync.sys en VMware Workstation 9.x anteriores a 9.0.3 y VMware Player 5.x anteriores a 5.0.3, VMware Fusion 5.x anteriores a 5.0.4, VMware ESXi 4.0 hasta 5.1, y VMware ESX 4.0 y 4.1, cuando se utiliza un Windows 32-bit invitado, permite a usuarios de los sistemas operativos invitados ganar privilegios del sistema operativo invitado a trav\u00e9s de una aplicaci\u00f3n que ejecuta una reserva de memoria manipulada." } ], "id": "CVE-2013-3519", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-04T18:56:56.413", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0014.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-20 09:15
Modified
2025-03-07 19:15
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use)
vulnerability that occurs during installation for the first time (the
user needs to drag or copy the application to a folder from the '.dmg'
volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may
exploit this vulnerability to escalate privileges to root on the system
where Fusion is installed or being installed for the first time.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F574C812-1E1F-4991-9442-74E799DACAD8", "versionEndExcluding": "13.5", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) \nvulnerability that occurs during installation for the first time (the \nuser needs to drag or copy the application to a folder from the \u0027.dmg\u0027 \nvolume) or when installing an upgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time." }, { "lang": "es", "value": "VMware Fusion (13.x anterior a 13.5) contiene una vulnerabilidad TOCTOU (Tiempo de verificaci\u00f3n, Tiempo de uso) que ocurre durante la instalaci\u00f3n por primera vez (el usuario debe arrastrar o copiar la aplicaci\u00f3n a una carpeta desde \u0027 .dmg\u0027 volume) o al instalar una actualizaci\u00f3n. Un actor malicioso con privilegios de usuario local no administrativo puede aprovechar esta vulnerabilidad para escalar privilegios a root en el System donde Fusion est\u00e1 instalado o donde se instala por primera vez." } ], "id": "CVE-2023-34046", "lastModified": "2025-03-07T19:15:35.433", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-20T09:15:12.717", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-25 21:15
Modified
2025-02-04 17:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B628132D-043A-4989-9524-9FA53B1DEADC", "versionEndExcluding": "13.0.2", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system." } ], "id": "CVE-2023-20871", "lastModified": "2025-02-04T17:15:10.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-25T21:15:10.023", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-01 21:30
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securityfocus.com/bid/107535 | ||
security@vmware.com | http://www.securityfocus.com/bid/108443 | ||
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-19-420/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107535 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108443 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-19-420/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B11AFA-BA40-40C7-9F8E-6CB1A7DAE369", "versionEndExcluding": "14.1.7", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0F08B22-5048-4A6C-9250-6A3593A4570F", "versionEndExcluding": "15.0.4", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*", "matchCriteriaId": "0BC70488-A435-43BE-AEF4-30CBA36CBC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*", "matchCriteriaId": "2B37DC7D-A1C6-468F-A42E-160CE226FF7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware ESXi (en las versiones 6.7 anteriores a la ESXi670-201903001, en las 6.5 anteriores a la ESXi650-201903001 y en las 6.0 anteriores a la ESXi600-201903001), Workstation (en las versiones 15.x anteriores a la 15.0.4 y en las 14.x anteriores a la 14.1.7), Fusion (en las versiones 11.x anteriores a la 11.0.3 y en las 10.x anteriores a la 10.1.6) contiene una vulnerabilidad de time-of-check time-of-use (TOCTOU) en la UHCI virtual (Universal Host Controller Interface) de USB 1.1. La explotaci\u00f3n de este fallo requiere que el atacante tenga acceso a una m\u00e1quina virtual con un controlador USB virtual presente. Este problema puede permitir que un invitado ejecute c\u00f3digo en el host" } ], "id": "CVE-2019-5519", "lastModified": "2024-11-21T04:45:05.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-01T21:30:44.000", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "security@vmware.com", "url": "http://www.securityfocus.com/bid/107535" }, { "source": "security@vmware.com", "url": "http://www.securityfocus.com/bid/108443" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "security@vmware.com", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-420/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/107535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/108443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-420/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/44840 | ||
cve@mitre.org | http://secunia.com/advisories/44904 | ||
cve@mitre.org | http://www.securityfocus.com/bid/48098 | ||
cve@mitre.org | http://www.securitytracker.com/id?1025601 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2011-0009.html | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/67815 | ||
cve@mitre.org | https://hermes.opensuse.org/messages/8711677 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44840 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44904 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48098 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025601 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0009.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67815 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://hermes.opensuse.org/messages/8711677 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
vmware | player | 3.1.3 | |
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
vmware | workstation | 7.1.3 | |
freebsd | freebsd | * | |
oracle | solaris | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "73C9E205-87EE-4CE2-A252-DED7BB6D4EAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DAA72ED8-3229-4220-BE75-712CA6E21062", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9EC02F3-3905-460D-8949-3B26394215CA", "vulnerable": false }, { "criteria": "cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "05924C67-F9A0-450E-A5B8-059651DD32E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a \"procedural error.\"" }, { "lang": "es", "value": "mount.vmhgfs en el Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, cuando es utilizado un Sistema Operativo invitado de Solaris o FreeBSD, permite a los usuarios del sistema operativo invitado modificar archivos del sistema operativo invitado arbitrarios por medio de vectores no especificados, relacionados con un \"procedural error\"." } ], "id": "CVE-2011-2145", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.3, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:02.833", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44840" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44904" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48098" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025601" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/8711677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/8711677" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-10-16 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 allows host OS users to cause a denial of service to the host OS via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2009/000066.html | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/36928 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1022981 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0013.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/2811 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2009/000066.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36928 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1022981 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0013.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2811 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8A8DAA7-1031-4F9A-8E53-9F675EF193A6", "versionEndIncluding": "2.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "942B4ED3-A68E-4106-A98B-FA7CD3505140", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DD1338C-8FC1-40A1-BAE8-B11F4354A0CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC862199-8AA7-4E5E-BA2B-DF5FC9A056BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BDA2CE1-E26E-4347-BD60-2764A19F5E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B503A45-D9F3-414D-9BFA-C58B1E81A39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the vmx86 kernel extension in VMware Fusion before 2.0.6 build 196839 allows host OS users to cause a denial of service to the host OS via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de enteros en la extensi\u00f3n del n\u00facleo vmx86 en VMware Fusion v2.0.6 anterior a build 196839 permite a los usuarios del sistema operativo anfitri\u00f3n causar una denegaci\u00f3n de servicio al sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados." } ], "evaluatorSolution": "Per: http://lists.vmware.com/pipermail/security-announce/2009/000066.html \r\n\r\nSolution\r\n\r\n Please review the patch/release notes for your product and version\r\n and verify the md5sum and/or the sha1sum of your downloaded file.\r\n\r\n VMware Fusion 2.0.6 (for Intel-based Macs): Download including\r\n VMware Fusion and a 12 month complimentary subscription to McAfee\r\n VirusScan Plus 2009\r\n\r\n md5sum: d35490aa8caa92e21339c95c77314b2f\r\n sha1sum: 9c41985d754ac718032a47af8a3f98ea28fddb26\r\n\r\n VMware Fusion 2.0.6 (for Intel-based Macs): Download including only\r\n VMware Fusion software\r\n\r\n md5sum: 2e8d39defdffed224c4bab4218cc6659\r\n sha1sum: 453d54a2f37b257a0aad17c95843305250c7b6ef\r\n", "id": "CVE-2009-3282", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-10-16T16:30:00.717", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36928" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022981" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2811" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-20 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securitytracker.com/id/1040024 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040025 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0021.html | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040024 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040025 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0021.html | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation_pro | * | |
vmware | workstation_pro | 14.0 | |
vmware | workstation_pro | 14.1.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | fusion | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE8FC688-FBC8-4BBF-BEC6-D8B85B61C3D4", "versionEndExcluding": "12.5.8", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFC8B7E0-C0D4-416C-B9BD-011B0DCE9A07", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4E5AECF4-F516-4FB8-906D-E8608D331C35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "20740117-8BC1-47B8-AA10-8ADF91F1CA86", "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\u0027s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall." }, { "lang": "es", "value": "VMware ESXi (6.5 anteriores a ESXi650-201710401-BG), Workstation (12.x anteriores a la 12.5.8) y Fusion (8.x anteriores a la 8.5.9) contienen una vulnerabilidad que podr\u00eda permitir que una sesi\u00f3n VNC autenticada provoque un desbordamiento de memoria din\u00e1mica (heap) mediante una serie espec\u00edfica de paquetes VNC, resultando en una corrupci\u00f3n de memoria din\u00e1mica. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda resultar en la ejecuci\u00f3n remota de c\u00f3digo en una m\u00e1quina virtual mediante la sesi\u00f3n VNC autenticada. Nota: Para que sea posible la explotaci\u00f3n en ESXi, VNC debe estar habilitado manualmente en un archivo de configuraci\u00f3n .vmx de la m\u00e1quina virtual. Adem\u00e1s, ESXi se debe configurar para permitir el tr\u00e1fico VNC a trav\u00e9s del firewall incorporado." } ], "id": "CVE-2017-4933", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-20T15:29:00.217", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040024" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040025" }, { "source": "security@vmware.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0021.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-08 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/96881 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038025 | ||
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96881 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038025 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | 8.0.0 | |
vmware | fusion | 8.0.1 | |
vmware | fusion | 8.0.2 | |
vmware | fusion | 8.1.0 | |
vmware | fusion | 8.1.1 | |
vmware | fusion | 8.5.0 | |
vmware | fusion | 8.5.1 | |
vmware | fusion | 8.5.2 | |
vmware | fusion | 8.5.3 | |
vmware | fusion | 8.5.4 | |
vmware | workstation | 12.0 | |
vmware | workstation | 12.0.1 | |
vmware | workstation | 12.1 | |
vmware | workstation | 12.1.1 | |
vmware | workstation | 12.5 | |
vmware | workstation | 12.5.1 | |
vmware | workstation | 12.5.2 | |
vmware | workstation | 12.5.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "25BBD4C7-C851-4D40-B6DD-92873319CD28", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDD345B3-810C-41D1-82CE-0CA0B4B1F5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "768A4D3B-CC19-4A3A-91D5-9C974F7F0247", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5D443-A330-40DF-939B-10597147CE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "42BF8A2A-295D-44D6-A38E-D4C35437F380", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC08D3D5-5D46-45C7-BD43-81E1D18FAB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "574DB25B-51E1-466A-8089-5108DB5D6FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "1659EFD4-97A7-4DBC-91DA-0B9EE18874F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D38FB28D-8A42-4877-92AF-39EE04B14DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "180E48AF-AD42-4A00-948A-9C1D70BE53F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "66C64A90-90A2-450A-8A79-AB69B5A939DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE6B9B4F-53C5-4B47-89C4-AD221DC91D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E293B67-98C3-4D8E-883C-2F2F774AE6F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AB307F39-3A90-4B62-B2BF-0E0CEBBBBC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "838C7C08-15ED-4379-8A5B-9419D13AE7FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion." }, { "lang": "es", "value": "La funci\u00f3n drag-and-drop (DnD) en Workstation versiones 12.x y anteriores a 12.5.4 y Fusion versiones 8.x y anteriores a 8.5.5 de VMware, presenta una vulnerabilidad de acceso a la memoria fuera de l\u00edmites. Esto puede permitir que un invitado ejecute c\u00f3digo en el sistema operativo que ejecuta Workstation o Fusion." } ], "id": "CVE-2017-4901", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-08T13:29:00.187", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96881" }, { "source": "security@vmware.com", "url": "http://www.securitytracker.com/id/1038025" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-28 16:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E347C39A-CFFB-45F4-92B4-61239718DE7D", "versionEndExcluding": "11.5.0", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DCA9649-CB58-49E9-B68D-76A878784EA1", "versionEndExcluding": "15.5.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." }, { "lang": "es", "value": "VMware ESXi (versi\u00f3n 6.7 anterior a ESXi670-201908101-SG y versi\u00f3n 6.5 anterior a ESXi650-201910401-SG), Workstation (versiones 15.x anteriores a la versi\u00f3n 15.5.0) y Fusion (versiones 11.x anteriores a la versi\u00f3n 11.5.0), contienen una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad shader. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a atacantes con privilegios normales de usuario crear una condici\u00f3n de denegaci\u00f3n de servicio en su propia VM. Una explotaci\u00f3n de este problema requiere que un atacante tenga acceso a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados. No est\u00e1n habilitados por defecto en ESXi y est\u00e1n habilitados por defecto en Workstation y Fusion." } ], "id": "CVE-2019-5536", "lastModified": "2024-11-21T04:45:08.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-28T16:15:14.807", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0019.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-14 16:16
Modified
2025-06-27 13:34
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA567E5A-412F-4ED3-9434-E0290CDF753F", "versionEndExcluding": "17.5.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "373FFB23-C9E8-495D-BD27-6DC875887440", "versionEndExcluding": "13.5.2", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device.\u00a0A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.\n\n" }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el dispositivo vbluetooth. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede leer informaci\u00f3n privilegiada contenida en la memoria del hipervisor desde una m\u00e1quina virtual." } ], "id": "CVE-2024-22269", "lastModified": "2025-06-27T13:34:58.657", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-14T16:16:10.117", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-13 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2009/000055.html | Patch, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/53634 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/502615/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/34471 | Patch | |
cve@mitre.org | http://www.securitytracker.com/id?1022031 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0006.html | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0944 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/49834 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2009/000055.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/53634 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/502615/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34471 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022031 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0944 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49834 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | ace | * | |
vmware | ace | 1.0 | |
vmware | ace | 1.0.0 | |
vmware | ace | 1.0.1 | |
vmware | ace | 1.0.2 | |
vmware | ace | 1.0.3 | |
vmware | ace | 1.0.4 | |
vmware | ace | 1.0.5 | |
vmware | ace | 1.0.6 | |
vmware | ace | 1.0.7 | |
vmware | ace | 2.0 | |
vmware | ace | 2.0.1 | |
vmware | ace | 2.0.2 | |
vmware | ace | 2.0.3 | |
vmware | ace | 2.0.4 | |
vmware | ace | 2.0.5 | |
vmware | ace | 2.5.0 | |
vmware | esx | 3.0.2 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esxi | 3.5 | |
vmware | fusion | * | |
vmware | fusion | 1.0 | |
vmware | fusion | 1.1 | |
vmware | fusion | 1.1.1 | |
vmware | fusion | 1.1.2 | |
vmware | fusion | 1.1.3 | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | player | * | |
vmware | player | 1.0.0 | |
vmware | player | 1.0.1 | |
vmware | player | 1.0.2 | |
vmware | player | 1.0.3 | |
vmware | player | 1.0.4 | |
vmware | player | 1.0.5 | |
vmware | player | 1.0.6 | |
vmware | player | 1.0.7 | |
vmware | player | 1.0.8 | |
vmware | player | 2.0 | |
vmware | player | 2.0.1 | |
vmware | player | 2.0.2 | |
vmware | player | 2.0.3 | |
vmware | player | 2.0.4 | |
vmware | player | 2.0.5 | |
vmware | player | 2.5 | |
vmware | server | 1.0 | |
vmware | server | 1.0.1 | |
vmware | server | 1.0.2 | |
vmware | server | 1.0.3 | |
vmware | server | 1.0.4 | |
vmware | server | 1.0.5 | |
vmware | server | 1.0.6 | |
vmware | server | 1.0.7 | |
vmware | server | 1.0.8 | |
vmware | server | 1.0.9 | |
vmware | server | 2.0 | |
vmware | workstation | * | |
vmware | workstation | 1.0.1 | |
vmware | workstation | 1.0.2 | |
vmware | workstation | 1.0.4 | |
vmware | workstation | 1.0.5 | |
vmware | workstation | 1.1 | |
vmware | workstation | 1.1.1 | |
vmware | workstation | 1.1.2 | |
vmware | workstation | 2.0 | |
vmware | workstation | 2.0.1 | |
vmware | workstation | 3.2.1 | |
vmware | workstation | 3.4 | |
vmware | workstation | 4.0 | |
vmware | workstation | 4.0.1 | |
vmware | workstation | 4.0.2 | |
vmware | workstation | 4.5.2 | |
vmware | workstation | 5 | |
vmware | workstation | 5.0.0 | |
vmware | workstation | 5.5 | |
vmware | workstation | 5.5.0 | |
vmware | workstation | 5.5.1 | |
vmware | workstation | 5.5.2 | |
vmware | workstation | 5.5.3 | |
vmware | workstation | 5.5.4 | |
vmware | workstation | 5.5.5 | |
vmware | workstation | 5.5.6 | |
vmware | workstation | 5.5.7 | |
vmware | workstation | 5.5.8 | |
vmware | workstation | 6.0 | |
vmware | workstation | 6.0.1 | |
vmware | workstation | 6.0.2 | |
vmware | workstation | 6.0.3 | |
vmware | workstation | 6.0.4 | |
vmware | workstation | 6.0.5 | |
vmware | workstation | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D249F86-E463-4AB1-BEEE-0828D5A2D761", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "700C0BB4-2272-4405-9D9A-A636E3D22461", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFC82A8C-E561-4E35-A84D-66A4D6C90264", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D346E48-887C-4D02-BFD3-D323B7F3871C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D9C6150A-2DF3-4F7B-B024-0F3DBB686124", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "40192EE1-A300-42C3-BC98-286C9E5A281E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "87291B27-442C-4CAB-94A1-67FC766486EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C4B04862-4377-422E-931A-B17FE1CA1884", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C35B6730-F05B-4B62-B4DE-07C61A4924F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1A5AA-BD9F-4263-B7C6-E744323C4D74", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D22E40D-C362-49FD-924C-262A64555934", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A48CEB4-5864-4A0F-B14C-CFE4699C3311", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78957047-FB9F-4D1D-B3D9-91257A6B4D7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A04DB52-C66C-4AA9-9D6F-9D2DC202C5C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "280033C5-90EF-4825-A87D-B23650D8C71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "78322B97-DBE0-4C7E-9826-11727254500E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA4159-EBBA-4326-A672-23322377781B", "versionEndIncluding": "2.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "942B4ED3-A68E-4106-A98B-FA7CD3505140", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DD1338C-8FC1-40A1-BAE8-B11F4354A0CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC862199-8AA7-4E5E-BA2B-DF5FC9A056BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BDA2CE1-E26E-4347-BD60-2764A19F5E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B503A45-D9F3-414D-9BFA-C58B1E81A39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC1C154A-3869-4189-A781-D3071D54143F", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E76D03A3-DB55-48A2-B5A5-64002D28B95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EAC68CA-DCA3-4399-807D-E7AC67C9C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "47B13A58-1876-4322-AC25-107D43BABD2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D04A928-4421-4BEE-9500-7398E4DB929B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "088450C4-9C6F-4651-8D59-C36F1B0601BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA35C066-90A9-4DE2-A97A-38A6CFC59A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "462EEAD5-A78C-4381-847E-B6F1BE4CB379", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E666A5E4-4CDD-4915-B0F3-C63998D01846", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F7AD12A-26C9-48AD-A32A-0F56545DF8E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "73C45BB0-C0DB-42B8-A238-B81D836CF91E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "297226F7-05CB-4721-9D02-51FE2919D2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D3F9D4D-2116-49A7-9292-AF6B4456E175", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EAA90-B24A-45E7-B99F-DA3554A16F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "446F2959-C42B-403B-AE1C-BA7D305C60CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73EC33AB-E92A-4AA8-A523-C341133BB515", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53197903-0614-4460-8944-C1B5257D71A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F037B05F-6F92-4BE1-B672-F677CBEFD075", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD6D27-1335-44EF-8B69-A9163A67BC2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A6BFEAE8-0118-4548-A6EA-E90FA8FE7AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "42049891-38B7-4BB7-8DA5-A87169E2D958", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "07139DF7-C36B-4FED-8558-7FA49BE0BCFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E0D7307-5946-45DC-88D3-6BC72EF50184", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "89699BB6-9E41-41DC-B597-B45CA05313A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D09AC-7D9B-4150-86BC-19F44F6F2CA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2786E370-6108-4695-B0A8-9F19D8E3C0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4D69FD9-F162-4623-A475-9FA7A3A6DF30", "versionEndIncluding": "6.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFBF029A-103D-4BB6-B037-25EC2224DF34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D00C4D90-3697-4F3F-8FFF-FE63F3AD0DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "35A717A5-60C2-4470-943E-CA53781D4B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0E8FBC02-7F2F-4AEF-A5A3-E283D192937C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "29AA2B37-BF5F-4AC5-844D-34CF56EC621C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "07131E56-53EE-4CE1-A135-050792EA3C1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "86334051-8763-4CD9-9480-CAEAE756DFCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "66596F04-9C2E-4091-85A7-40239F3F920E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E831531-60FE-4DFC-994E-7409E6C69D43", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*", "matchCriteriaId": "4C1A275E-2152-4A37-8CFE-34E8900E3426", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B7A688A2-3E9C-4AA3-832B-300A5A311C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "89098CFF-4696-4BD9-9BC9-D7C2D92FE729", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A30DFFE7-EB73-4A88-A23B-9B386C091314", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C230D-7BAA-4A77-9E96-B1B994F4AAC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD0FE7C5-2C46-4B59-9242-A03B986C07DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*", "matchCriteriaId": "37595A89-52C5-4699-A463-C9D91B91716B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53FBB074-4EAC-4CEC-AFC5-33C66B135F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "525D50A3-2943-4B96-B354-F81F814A7707", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "294B621F-6C1A-4571-AE13-49495680D255", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "FCF51A7F-59DA-4F64-A4F7-3A250C950D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7BA47458-E783-4A6A-ABF1-59E8D87E9B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "16A1141D-9718-4A22-8FF2-AEAD28E07291", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "D75ED54E-8E55-48BF-A52E-19FCCE895C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "B53297E3-0C74-421B-8058-DAF7357D421A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "ACDEFCEF-F943-449B-91D8-A8CB290C7AFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "97957D6F-0249-4814-8755-5C4537B58E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "89329F80-7134-4AB2-BDA3-E1B887F633B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4408849A-21F1-40F5-A528-0BD47E1BF823", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9938CB4F-96D1-4852-9694-28A93E13AA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCB61760-87FD-4E60-ADC6-407EFA13773C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FBDE6D5-7131-421A-BABE-32F281615597", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "89AA4FEF-FF8F-4706-89BC-8396F7614EB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFC6B629-30B3-4C45-B5E9-1B4310F186FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en la funci\u00f3n de pantalla de m\u00e1quina virtual de en VMware Workstation v6.5.1 y anteriores; VMware Player v2.5.1 y anteriores; VMware ACE v2.5.1 y anteriores; VMware Server v1.x antes de la v1.0.9 build 156507 y v2.x antes de v2.0.1 build 156745; VMware Fusion antes de la v2.0.4 build 159196; VMware ESXi 3.5 y VMware ESX v3.0.2, v3.0.3 y v3.5 permite ejecutar, a los usuarios invitados, c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n a trav\u00e9s de vectores desconocidos, una vulnerabilidad diferente a la CVE-2008-4916." } ], "id": "CVE-2009-1244", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-13T16:30:00.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000055.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/53634" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/502615/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/34471" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022031" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0006.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49834" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/53634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502615/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/34471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6065" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/44840 | ||
cve@mitre.org | http://secunia.com/advisories/44904 | ||
cve@mitre.org | http://www.securityfocus.com/bid/48098 | ||
cve@mitre.org | http://www.securitytracker.com/id?1025601 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2011-0009.html | Patch, Vendor Advisory | |
cve@mitre.org | https://hermes.opensuse.org/messages/8711677 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44840 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44904 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48098 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025601 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0009.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hermes.opensuse.org/messages/8711677 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
vmware | workstation | 7.1.3 | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
vmware | player | 3.1.3 | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DAA72ED8-3229-4220-BE75-712CA6E21062", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "73C9E205-87EE-4CE2-A252-DED7BB6D4EAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory." }, { "lang": "es", "value": "Una Condici\u00f3n de carrera en mount.vmhgfs en VMware Host Guest File System (HGFS) en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, permite a los usuarios del Sistema Operativo invitado alcanzar privilegios en el Sistema Operativo Invitado al montar un sistema de archivos sobre un directorio arbitrario." } ], "id": "CVE-2011-1787", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:01.987", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44840" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44904" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48098" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025601" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/8711677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/8711677" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-12 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
cve@mitre.org | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/63606 | ||
cve@mitre.org | http://secunia.com/advisories/39201 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39206 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39215 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/39407 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023835 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/63606 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39201 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39206 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39215 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/39407 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023835 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 6.5.0 | |
vmware | workstation | 6.5.1 | |
vmware | workstation | 6.5.2 | |
vmware | workstation | 6.5.3 | |
vmware | player | 2.5 | |
vmware | player | 2.5.1 | |
vmware | player | 2.5.2 | |
vmware | player | 2.5.3 | |
linux | linux_kernel | * | |
vmware | server | 2.0.0 | |
vmware | server | 2.0.1 | |
vmware | server | 2.0.2 | |
linux | linux_kernel | * | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | fusion | 2.0.3 | |
vmware | fusion | 2.0.4 | |
vmware | fusion | 2.0.5 | |
vmware | fusion | 2.0.6 | |
vmware | vix_api | 1.6.0 | |
vmware | vix_api | 1.6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6C47EB8-8844-4D49-9246-008F7AE45C60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vix_api:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9FDEEE1-BC47-4EE6-A56B-C7626D554019", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vix_api:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "98918409-9F58-4FBC-B5C1-4015B5E3C0FE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in vmrun in VMware VIX API 1.6.x, VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Linux, and VMware Fusion 2.x before 2.0.7 build 246742, allows local users to gain privileges via format string specifiers in process metadata." }, { "lang": "es", "value": "Vulnerabilidad de formato de cadena en vmrun en VMware VIX API v1.6.x, VMware Workstation v6.5.x antes de v6.5.4 build 246459, VMware Player v2.5.x antes de v2.5.4 build 246.459, y VMware Server v2.x en Linux y VMware Fusion v2.x antes de v2.0.7 build 246.742, permite a usuarios locales conseguir privilegios a trav\u00e9s de especificadores de formato de cadenas en los metadatos de proceso." } ], "id": "CVE-2010-1139", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-12T18:30:00.587", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/63606" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39201" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39215" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/39407" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023835" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/63606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-04 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/81694 | ||
cve@mitre.org | http://secunia.com/advisories/49032 | ||
cve@mitre.org | http://www.securityfocus.com/bid/53369 | ||
cve@mitre.org | http://www.securitytracker.com/id?1027019 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2012-0009.html | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/75376 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/81694 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49032 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53369 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027019 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2012-0009.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75376 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 8.0 | |
vmware | workstation | 8.0.1 | |
vmware | workstation | 8.0.2 | |
vmware | player | 4.0 | |
vmware | player | 4.0.1 | |
vmware | player | 4.0.2 | |
vmware | fusion | 4.0 | |
vmware | fusion | 4.0.1 | |
vmware | fusion | 4.0.2 | |
vmware | fusion | 4.1 | |
vmware | fusion | 4.1.1 | |
vmware | fusion | 4.1.2 | |
vmware | esxi | 3.5 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "60234129-7F7F-49FA-A425-CDAB4D09AB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4FB73EC4-F3CE-428B-BA40-47FB21181543", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "927863C2-5A61-4137-83AC-6CF3F2958941", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F74559CB-6E52-421F-88F3-739913C26C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4870DAA2-6670-47EF-BF74-6E39B92E75DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "70C64B80-4928-4ABA-AF4E-1977C252BAEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FAE88D8C-9CC3-46D1-9F26-290BC679F47E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*", "matchCriteriaId": "58ED8AB4-0FDF-4752-B44E-56F58593CE41", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29100-E124-4416-95CF-18B4246D43F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*", "matchCriteriaId": "37A5D726-3D38-44D5-B509-1B8B003903A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*", "matchCriteriaId": "A4DA3B20-A743-4F37-A095-65161FFBEB73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*", "matchCriteriaId": "FF7C3C65-BE63-407E-9CFD-E571025C3E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 8.x before 8.0.3, VMware Player 4.x before 4.0.3, VMware Fusion 4.x through 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 do not properly configure the virtual floppy device, which allows guest OS users to cause a denial of service (out-of-bounds write operation and VMX process crash) or possibly execute arbitrary code on the host OS by leveraging administrative privileges on the guest OS." }, { "lang": "es", "value": "VMware Workstation v8.x antes de v8.0.3, VMware Player v4.x antes de v4.0.3, VMware Fusion v4.x hasta v4.1.2, VMware ESXi v3.5 hasta v5.0 y VMware ESX v3.5 hasta v4.1 no configura correctamente el dispositivo de disco virtual, lo que permite a los usuarios invitados del sistema operativo causar una denegaci\u00f3n de servicio (operaci\u00f3n de escritura fuera de los l\u00edmites y la ca\u00edda del proceso VMX) o posiblemente ejecutar c\u00f3digo arbitrario en el sistema operativo anfitri\u00f3n mediante el aprovechamiento de privilegios de administrador en el sistema operativo invitado." } ], "id": "CVE-2012-2449", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-04T16:55:01.543", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/81694" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/49032" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53369" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027019" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75376" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/81694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine's vmx process leading to a partial denial of service condition.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-782/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-782/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in the Shader functionality. A malicious actor with non-administrative local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to crash the virtual machine\u0027s vmx process leading to a partial denial of service condition." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5. 5), contienen una vulnerabilidad de lectura fuera de l\u00edmites en la funcionalidad Shader. Un actor malicioso con acceso local no administrativo a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados puede ser capaz de explotar esta vulnerabilidad para bloquear el proceso vmx de la m\u00e1quina virtual conllevando a una condici\u00f3n de denegaci\u00f3n de servicio parcial" } ], "id": "CVE-2020-3970", "lastModified": "2024-11-21T05:32:05.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.443", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-782/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-782/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-05 14:29
Modified
2024-11-21 03:26
Severity ?
Summary
VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/102441 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040109 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040136 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102441 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040109 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040136 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 12.0.0 | |
vmware | workstation | 12.0.1 | |
vmware | workstation | 12.1 | |
vmware | workstation | 12.1.1 | |
vmware | workstation | 12.5 | |
vmware | workstation | 12.5.0 | |
vmware | workstation | 12.5.1 | |
vmware | workstation | 12.5.2 | |
vmware | workstation | 12.5.3 | |
vmware | workstation | 12.5.4 | |
vmware | workstation | 12.5.5 | |
vmware | workstation | 12.5.6 | |
vmware | workstation | 12.5.7 | |
vmware | workstation | 12.5.8 | |
vmware | workstation | 12.5.9 | |
vmware | workstation | 14.0 | |
vmware | fusion | 8.0 | |
vmware | fusion | 8.0.1 | |
vmware | fusion | 8.0.2 | |
vmware | fusion | 8.1 | |
vmware | fusion | 8.1.1 | |
vmware | fusion | 8.5 | |
vmware | fusion | 8.5.1 | |
vmware | fusion | 8.5.2 | |
vmware | fusion | 8.5.3 | |
vmware | fusion | 8.5.4 | |
vmware | fusion | 8.5.5 | |
vmware | fusion | 8.5.6 | |
vmware | fusion | 8.5.7 | |
vmware | fusion | 8.5.8 | |
vmware | fusion | 8.5.9 | |
vmware | fusion | 8.5.10 | |
vmware | fusion | 10.0 | |
vmware | fusion | 10.0.1 | |
vmware | fusion | 10.1.0 | |
vmware | fusion | 10.1.1 | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C2CB0-9A2B-46B2-9E75-2BADAE722BB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D38FB28D-8A42-4877-92AF-39EE04B14DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "180E48AF-AD42-4A00-948A-9C1D70BE53F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "66C64A90-90A2-450A-8A79-AB69B5A939DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE6B9B4F-53C5-4B47-89C4-AD221DC91D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "42EF613B-3436-4951-8F4D-9F22144E06CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E293B67-98C3-4D8E-883C-2F2F774AE6F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AB307F39-3A90-4B62-B2BF-0E0CEBBBBC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "838C7C08-15ED-4379-8A5B-9419D13AE7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C064187-0870-4672-9D64-92D643FA9C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "60F08698-0194-4892-9A46-93C53C0C660B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "287275D4-E311-4A1B-BC5C-2FB3A64691E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "ED552760-4DB1-4E56-B6C1-23E053858055", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "F6A4B5F2-7123-40C5-BBB7-D3EA3EA3B204", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "C7D95044-581B-4634-8A5A-D6167AE4E2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "7BB96DAF-5A43-4437-81BF-B47067336505", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "61B23099-25EB-44B6-A62B-2E46CD151994", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55F26BA-4AFA-419A-BB0E-5C369F58F126", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "B34B944F-073D-4B52-8B92-0620603885DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5D443-A330-40DF-939B-10597147CE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "42BF8A2A-295D-44D6-A38E-D4C35437F380", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC08D3D5-5D46-45C7-BD43-81E1D18FAB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "574DB25B-51E1-466A-8089-5108DB5D6FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0BF7F09F-D8B3-40AF-9111-E7C14832C5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "555DD10F-7EA8-4107-A31F-2C7CED41058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "7EE4888B-156C-48BC-8035-3A0424CB6037", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "6D4DA202-3D18-4DDC-89E4-81FFF68EDFD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "2B9D03A0-1256-4394-81F2-31352B7C92D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "A6340A55-C86E-4DB3-B36E-2C5E9F74508C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3A7D240-B003-4A48-95DA-F201EB3658D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "62E86224-4DF3-403D-9183-1435E0A018E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDB49D1C-F166-4B8F-8EDF-0D1211119C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:10.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "033109C6-28E8-44EE-AEDD-C3A2EDEA77D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default." }, { "lang": "es", "value": "VMware Workstation (14.x y 12.x) y Fusion (10.x y 8.x) contienen una vulnerabilidad de control de acceso invitado. Este problema podr\u00eda permitir la ejecuci\u00f3n de programas a trav\u00e9s de Unity en m\u00e1quinas virtuales de Windows bloqueadas. Se tiene que actualizar VMware Tools a la versi\u00f3n 10.2.0 para cada m\u00e1quina virtual para resolver CVE-2017-4945. La versi\u00f3n 10.2.0 de VMware Tools viene por defecto en Workstation 14.1.0 y Fusion 10.1.0." } ], "id": "CVE-2017-4945", "lastModified": "2024-11-21T03:26:44.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-05T14:29:10.467", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102441" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040109" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040136" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0003.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-16 18:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "41811572-D733-45DB-9202-25E435E4E976", "versionEndExcluding": "11.5.2", "versionStartExcluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine." }, { "lang": "es", "value": "VMware Workstation (versiones 15.x anteriores a 15.5.2) y Fusion (versiones 11.x anteriores a 11.5.2), contienen una vulnerabilidad de uso previo en vmnetdhcp. Una explotaci\u00f3n con \u00e9xito de este problema puede conllevar a una ejecuci\u00f3n de c\u00f3digo en el host del invitado o puede permitir a atacantes crear una condici\u00f3n de denegaci\u00f3n de servicio del servicio vmnetdhcp que se ejecuta sobre la m\u00e1quina host." } ], "id": "CVE-2020-3947", "lastModified": "2024-11-21T05:32:00.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-16T18:15:12.463", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-07 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/97163 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97163 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB0B91B-F8F6-456F-8FBD-7B98A9ABA95A", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F1AB0A-CD31-4FE7-AE1F-4C6A111D1C62", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "matchCriteriaId": "4DC223AC-EB3D-48CF-A6CC-D35E00A38394", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "matchCriteriaId": "75C8E87E-A869-49F8-89F9-DE64A45CDB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "matchCriteriaId": "E7F8878C-F73D-4549-9607-74880176D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "matchCriteriaId": "E47D369F-13B2-42B3-BB74-60AAD0954B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1671-5010-4BB5-BFA7-217FBB946B59", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3E0004-E6F1-4C0D-9B24-A7F1AF4BCBD8", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "Wmware ESXi sin el parche ESXi650-201703410-SG y 5.5 sin el parche ESXi550-201703401-SG; Workstation Pro / Player 12.x anterior a 12.5.5 y Fusion Pro /Fusion 8.x anterior a la 8.5.6 tiene un buffer overflow basado en el heap --heap-- en SVGA. Este problema permitir\u00eda a un hu\u00e9sped ejecutar c\u00f3digo en el host." } ], "id": "CVE-2017-4902", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-07T18:29:00.317", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97163" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-20 17:15
Modified
2024-11-21 05:32
Severity ?
Summary
In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | fusion | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", "matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", "matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", "matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", "matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", "matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", "matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", "matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", "matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", "matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", "matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", "matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", "matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", "matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", "matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", "matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", "matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", "matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", "matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", "matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", "matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", "matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", "matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", "matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", "matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", "matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*", "matchCriteriaId": "6431DD1F-2269-4AFB-B486-9B6373F41C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*", "matchCriteriaId": "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*", "matchCriteriaId": "A86BDAB4-3924-45A8-9130-517DEA184FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*", "matchCriteriaId": "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "102115DE-F589-4153-9597-160D82FBAFC7", "versionEndExcluding": "3.9", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A748C-18BC-4EA0-B599-CFAE4E36B00B", "versionEndExcluding": "15.1.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EE7A5C1-9A67-410D-9A04-FAEFA1D1DB1B", "versionEndExcluding": "11.1.0", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In VMware ESXi (6.7 before ESXi670-201908101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x before 15.1.0), Fusion (11.x before 11.1.0), the VMCI host drivers used by VMware hypervisors contain a memory leak vulnerability. A malicious actor with access to a virtual machine may be able to trigger a memory leak issue resulting in memory resource exhaustion on the hypervisor if the attack is sustained for extended periods of time." }, { "lang": "es", "value": "En VMware ESXi (versiones 6.7 anteriores a ESXi670-201908101-SG, versiones 6.5 anteriores a ESXi650-202007101-SG), Workstation (versiones 15.x anteriores a 15.1.0), Fusion (versiones 11.x anteriores a 11.1.0), los controladores del host VMCI utilizados por los hipervisores de VMware contienen una vulnerabilidad de filtrado de memoria.\u0026#xa0;Un actor malicioso con acceso a una m\u00e1quina virtual puede desencadenar un problema de filtrado de memoria que resulte en el agotamiento de los recursos de memoria en el hipervisor si el ataque se mantiene durante per\u00edodos prolongados" } ], "id": "CVE-2020-3995", "lastModified": "2024-11-21T05:32:07.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-20T17:15:13.043", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-15 12:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/105094 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041491 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0022.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105094 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041491 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0022.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFD884A1-8F04-4B77-BF46-D074BAABE70A", "versionEndExcluding": "10.1.3", "versionStartExcluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA96BDE8-8107-47E9-BF6C-6F742455FB07", "versionEndExcluding": "14.1.3", "versionStartIncluding": "14.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware Workstation (en versiones 14.x anteriores a la 14.1.3) y Fusion (en versiones 10.x anteriores a la 10.1.3) contienen una vulnerabilidad de escritura fuera de l\u00edmites en el dispositivo e1000. Este problema puede permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2018-6973", "lastModified": "2024-11-21T04:11:30.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-15T12:29:00.587", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105094" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041491" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041491" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0022.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-08 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/539131/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/92323 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1036544 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1036545 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1036619 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2016-0010.html | Mitigation, Vendor Advisory | |
cve@mitre.org | https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/539131/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92323 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036544 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036545 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036619 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2016-0010.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CB2D70B-0044-42DB-B823-CC7EF5D836E3", "versionEndExcluding": "12.1.1", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F922894-BCAF-4807-8D2F-439578088E6B", "versionEndExcluding": "12.1.1", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5D37AF0-1CE9-413B-B2CD-67ABA217185B", "versionEndIncluding": "6.0", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2197947-1CFC-4A5E-ACED-3EABD2BADB80", "versionEndExcluding": "8.1.1", "versionStartIncluding": "8.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2449175-330C-47FE-9AE6-BA7AD91D3DA0", "versionEndIncluding": "10.3.22", "versionStartIncluding": "9.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory." }, { "lang": "es", "value": "Vulnerabilidad de b\u00fasqueda de ruta no confiable en la caracter\u00edstica HGFS (tambi\u00e9n conocido como Shared Folders) en VMware Tools 10.0.5 en VMware ESXi 5.0 hasta la versi\u00f3n 6.0, VMware Workstation Pro 12.1.x en versiones anteriores a 12.1.1, VMware Workstation Player 12.1.x en versiones anteriores a 12.1.1 y VMware Fusion 8.1.x en versiones anteriores a 8.1.1 permite a usuarios locales obtener privilegios a trav\u00e9s de una libreria troyanizada o fichero DLL troyanizado en el directorio de trabajo actual" } ], "id": "CVE-2016-5330", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-08T01:59:16.463", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/539131/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92323" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036544" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036545" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036619" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0010.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/misc/vmhgfs_webdav_dll_sideload" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/539131/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-25 22:15
Modified
2025-02-04 18:15
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B628132D-043A-4989-9524-9FA53B1DEADC", "versionEndExcluding": "13.0.2", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "53930936-892B-421E-B75C-BD2DEC4A09AA", "versionEndExcluding": "17.0.2", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine." } ], "id": "CVE-2023-20870", "lastModified": "2025-02-04T18:15:33.077", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-04-25T22:15:09.463", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/75092 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032529 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032530 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75092 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032529 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | horizon_client | 3.2.0 | |
vmware | horizon_client | 3.3 | |
vmware | horizon_view_client | 5.4 | |
vmware | horizon_view_client | 5.4.1 | |
microsoft | windows | * | |
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 6.0.5 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.0.1 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | player | 6.0.5 | |
vmware | player | 7.0 | |
vmware | player | 7.1 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | workstation | 10.0.5 | |
vmware | workstation | 11.0 | |
vmware | workstation | 11.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C7BA06B-60FB-456B-A4BF-401F82E88BBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E82AFF09-F9F6-486B-9299-3852EBD9B333", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9391EA21-2A10-445A-B88A-103025C9A343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "85A09E65-9C4C-42FD-A1B0-E925A905875A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7EF002E-10E1-4405-8C55-BD91AD45B891", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "93872771-BD86-4707-926B-F6C3577C33A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8903-B853-43A2-88C3-D79BBA70F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71B0563B-F300-448D-8450-9B7B862F4560", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "492D7AD2-D660-48F5-A9BE-28CCA6A6B658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "90F0250C-EE18-486B-90D7-348FEF01C2D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors." }, { "lang": "es", "value": "TPInt.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado causar una denegaci\u00f3n de servicio del sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-2340", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-13T14:59:03.763", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75092" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-17 19:15
Modified
2025-03-13 17:28
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
security@vmware.com | http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | horizon_client | * | |
vmware | remote_console | * | |
apple | macos | - |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "VMware Multiple Products Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F835663-B6E8-41FB-BDE0-C847E9086448", "versionEndExcluding": "5.4.0", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:remote_console:*:*:*:*:*:*:*:*", "matchCriteriaId": "7395721C-7903-4336-AD4C-D5544CF4AC10", "versionEndExcluding": "11.0.1", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed." }, { "lang": "es", "value": "VMware Fusion (versiones 11.x anteriores a 11.5.2), VMware Remote Console for Mac (versiones 11.x y anteriores a 11.0.1) y Horizon Client for Mac (versi\u00f3n 5.x y anteriores a 5.4.0), contienen una vulnerabilidad de escalada de privilegios debido al uso inapropiado de binarios setuid. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a atacantes con privilegios de usuario normal escalar sus privilegios a root sobre el sistema donde Fusion, VMRC o Horizon Client es instalado." } ], "id": "CVE-2020-3950", "lastModified": "2025-03-13T17:28:11.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-03-17T19:15:12.050", "references": [ { "source": "security@vmware.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html" }, { "source": "security@vmware.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2012-04-17 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://osvdb.org/81163 | ||
cve@mitre.org | http://secunia.com/advisories/48782 | ||
cve@mitre.org | http://www.securityfocus.com/bid/53006 | ||
cve@mitre.org | http://www.securitytracker.com/id?1026922 | ||
cve@mitre.org | http://www.securitytracker.com/id?1026923 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2012-0007.html | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/81163 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48782 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53006 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026922 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026923 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2012-0007.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 8.0 | |
vmware | workstation | 8.0.1 | |
vmware | player | 4.0 | |
vmware | player | 4.0.1 | |
vmware | player | 4.0.2 | |
vmware | fusion | 4.0 | |
vmware | fusion | 4.0.1 | |
vmware | fusion | 4.0.2 | |
vmware | fusion | 4.1 | |
vmware | fusion | 4.1.1 | |
vmware | esxi | 3.5 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "60234129-7F7F-49FA-A425-CDAB4D09AB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4FB73EC4-F3CE-428B-BA40-47FB21181543", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "927863C2-5A61-4137-83AC-6CF3F2958941", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F74559CB-6E52-421F-88F3-739913C26C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4870DAA2-6670-47EF-BF74-6E39B92E75DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FAE88D8C-9CC3-46D1-9F26-290BC679F47E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*", "matchCriteriaId": "58ED8AB4-0FDF-4752-B44E-56F58593CE41", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29100-E124-4416-95CF-18B4246D43F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*", "matchCriteriaId": "37A5D726-3D38-44D5-B509-1B8B003903A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*", "matchCriteriaId": "A4DA3B20-A743-4F37-A095-65161FFBEB73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*", "matchCriteriaId": "FF7C3C65-BE63-407E-9CFD-E571025C3E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors." }, { "lang": "es", "value": "VMware Workstation versiones 8.x anteriores a 8.0.2, VMware Player versiones 4.x anteriores a 4.0.2, VMware Fusion versiones 4.x anteriores a 4.1.2, VMware ESXi versiones 3.5 hasta 5.0, y VMware ESX versiones 3.5 hasta 4.1 utilizan una ACL incorrecta para la carpeta VMware Tools, que permite a los usuarios del Sistema Operativo invitado alcanzar privilegios de SO invitado por medio de vectores no especificados." } ], "id": "CVE-2012-1518", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-04-17T21:55:01.307", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/81163" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/48782" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53006" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1026922" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1026923" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/81163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-05-22 13:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware Fusion (10.x before 10.1.2) contains a signature bypass vulnerability which may lead to a local privilege escalation.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/104235 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040957 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0013.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104235 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040957 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0013.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C4E179-64D8-44F4-A60E-2C67268669C1", "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion (10.x before 10.1.2) contains a signature bypass vulnerability which may lead to a local privilege escalation." }, { "lang": "es", "value": "VMware Workstation (versiones 14.x anteriores a la 14.1.2) y Fusion (versiones 10.x anteriores a la 10.1.2) contienen m\u00faltiples vulnerabilidades de denegaci\u00f3n de servicio (DoS) que ocurren debido a problemas de desreferencia de puntero NULL en el manipulador RPC. La explotaci\u00f3n exitosa de estos problemas podr\u00eda permitir que un atacante con privilegios limitados en la m\u00e1quina invitada desencadene una denegaci\u00f3n de servicio (DoS) en su m\u00e1quina invitada." } ], "id": "CVE-2018-6962", "lastModified": "2024-11-21T04:11:29.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-22T13:29:00.390", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104235" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040957" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0013.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-24 16:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-786/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-786/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an off-by-one heap-overflow vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5. 5), contienen una vulnerabilidad de desbordamiento de pila por un paso en el dispositivo SVGA. Un actor malicioso con acceso local a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados puede ser capaz de explotar esta vulnerabilidad para ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual. Condiciones adicionales m\u00e1s all\u00e1 del control del atacante deben estar presentes para que la explotaci\u00f3n sea posible" } ], "id": "CVE-2020-3969", "lastModified": "2024-11-21T05:32:05.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-24T16:15:10.923", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-786/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-786/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-193" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-15 18:29
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0006.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7A2CFA-E5C0-49F9-8E60-0965AEBE364D", "versionEndExcluding": "14.1.6", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D75366-3750-458A-BAF4-6DC91CC08948", "versionEndExcluding": "15.0.3", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." }, { "lang": "es", "value": "La actualizaciones de VMware ESXi (versiones 6.7 anteriores a ESXi670-201904101-SG y 6.5 anteriores a ESXi650-201903001), Workstation (versiones 15.x anteriores a 15.0.3 y 14.x anteriores a 14.1.6), Fusion (versiones 11.x anteriores a 11.0.3 y 10.x anteriores a 10.1.6) contienen m\u00faltiples vulnerabilidades de fuera de l\u00edmites en el traductor shader. La explotaci\u00f3n de estos problemas requiere que un atacante tenga acceso a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados. La explotaci\u00f3n exitosa de estos problemas puede conducir a la divulgaci\u00f3n de informaci\u00f3n o puede permitir a atacantes con privilegios de usuario normal crear una condici\u00f3n de denegaci\u00f3n de servicio en su propia m\u00e1quina virtual. La soluci\u00f3n a estos problemas consiste en desactivar la funci\u00f3n de aceleraci\u00f3n 3D. Esta funci\u00f3n no est\u00e1 activada de forma predeterminada en ESXi y est\u00e1 activada de forma predeterminada en Workstation y Fusion." } ], "id": "CVE-2019-5517", "lastModified": "2024-11-21T04:45:05.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-15T18:29:01.177", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-06-01 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/35269 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/503912/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/35141 | ||
cve@mitre.org | http://www.securitytracker.com/id?1022300 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0007.html | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1452 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35269 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/503912/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35141 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022300 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0007.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1452 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | ace | * | |
vmware | ace | 1.0 | |
vmware | ace | 1.0.0 | |
vmware | ace | 1.0.1 | |
vmware | ace | 1.0.2 | |
vmware | ace | 1.0.3 | |
vmware | ace | 1.0.3_build_54075 | |
vmware | ace | 1.0.4 | |
vmware | ace | 1.0.5 | |
vmware | ace | 1.0.6 | |
vmware | ace | 1.0.7 | |
vmware | ace | 2.0 | |
vmware | ace | 2.0.1 | |
vmware | ace | 2.0.1_build_55017 | |
vmware | ace | 2.0.2 | |
vmware | ace | 2.0.3 | |
vmware | ace | 2.0.4 | |
vmware | ace | 2.0.5 | |
vmware | ace | 2.5.0 | |
vmware | esx | 3.0.2 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esxi | 3.5 | |
vmware | fusion | * | |
vmware | fusion | 2.0 | |
vmware | player | * | |
vmware | player | 1.0.0 | |
vmware | player | 1.0.1 | |
vmware | player | 1.0.2 | |
vmware | player | 1.0.3 | |
vmware | player | 1.0.4 | |
vmware | player | 1.0.5 | |
vmware | player | 1.0.6 | |
vmware | player | 1.0.7 | |
vmware | player | 1.0.8 | |
vmware | player | 2.0 | |
vmware | player | 2.0.1 | |
vmware | player | 2.0.2 | |
vmware | player | 2.0.3 | |
vmware | player | 2.0.4 | |
vmware | player | 2.0.5 | |
vmware | player | 2.5 | |
vmware | server | * | |
vmware | server | 1.0 | |
vmware | server | 1.0.1 | |
vmware | server | 1.0.1_build_29996 | |
vmware | server | 1.0.2 | |
vmware | server | 1.0.3 | |
vmware | server | 1.0.4 | |
vmware | server | 1.0.4_build_56528 | |
vmware | server | 1.0.5 | |
vmware | server | 1.0.6 | |
vmware | server | 1.0.7 | |
vmware | server | 2.0 | |
vmware | workstation | * | |
vmware | workstation | 1.0.1 | |
vmware | workstation | 1.0.2 | |
vmware | workstation | 1.0.4 | |
vmware | workstation | 1.0.5 | |
vmware | workstation | 1.1 | |
vmware | workstation | 1.1.1 | |
vmware | workstation | 1.1.2 | |
vmware | workstation | 2.0 | |
vmware | workstation | 2.0.1 | |
vmware | workstation | 3.2.1 | |
vmware | workstation | 3.4 | |
vmware | workstation | 4.0 | |
vmware | workstation | 4.0.1 | |
vmware | workstation | 4.0.1_build_5289 | |
vmware | workstation | 4.0.2 | |
vmware | workstation | 4.5.2 | |
vmware | workstation | 4.5.2_build_8848 | |
vmware | workstation | 4.5.2_build_8848 | |
vmware | workstation | 5 | |
vmware | workstation | 5.0.0 | |
vmware | workstation | 5.0.0_build_13124 | |
vmware | workstation | 5.5 | |
vmware | workstation | 5.5.0 | |
vmware | workstation | 5.5.0_build_13124 | |
vmware | workstation | 5.5.1 | |
vmware | workstation | 5.5.1_build_19175 | |
vmware | workstation | 5.5.2 | |
vmware | workstation | 5.5.3 | |
vmware | workstation | 5.5.3 | |
vmware | workstation | 5.5.3_build_34685 | |
vmware | workstation | 5.5.3_build_42958 | |
vmware | workstation | 5.5.4 | |
vmware | workstation | 5.5.4_build_44386 | |
vmware | workstation | 5.5.5 | |
vmware | workstation | 5.5.5_build_56455 | |
vmware | workstation | 5.5.6 | |
vmware | workstation | 5.5.7 | |
vmware | workstation | 5.5.8 | |
vmware | workstation | 6.0 | |
vmware | workstation | 6.0.1 | |
vmware | workstation | 6.0.1_build_55017 | |
vmware | workstation | 6.0.2 | |
vmware | workstation | 6.0.3 | |
vmware | workstation | 6.0.4 | |
vmware | workstation | 6.0.5 | |
vmware | workstation | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D249F86-E463-4AB1-BEEE-0828D5A2D761", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "700C0BB4-2272-4405-9D9A-A636E3D22461", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CFC82A8C-E561-4E35-A84D-66A4D6C90264", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D346E48-887C-4D02-BFD3-D323B7F3871C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D9C6150A-2DF3-4F7B-B024-0F3DBB686124", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*", "matchCriteriaId": "E2B6602F-EF25-4E20-B4AA-955C026F7AD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "40192EE1-A300-42C3-BC98-286C9E5A281E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "87291B27-442C-4CAB-94A1-67FC766486EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C4B04862-4377-422E-931A-B17FE1CA1884", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C35B6730-F05B-4B62-B4DE-07C61A4924F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1A5AA-BD9F-4263-B7C6-E744323C4D74", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D22E40D-C362-49FD-924C-262A64555934", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*", "matchCriteriaId": "9D438AB9-825C-4A9B-A3FF-55F2E5743B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A48CEB4-5864-4A0F-B14C-CFE4699C3311", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78957047-FB9F-4D1D-B3D9-91257A6B4D7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A04DB52-C66C-4AA9-9D6F-9D2DC202C5C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "280033C5-90EF-4825-A87D-B23650D8C71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "78322B97-DBE0-4C7E-9826-11727254500E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "4004A38A-01A6-41BE-84EB-1D7C7FAD0214", "versionEndIncluding": "2.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC1C154A-3869-4189-A781-D3071D54143F", "versionEndIncluding": "2.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E76D03A3-DB55-48A2-B5A5-64002D28B95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EAC68CA-DCA3-4399-807D-E7AC67C9C3E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "47B13A58-1876-4322-AC25-107D43BABD2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D04A928-4421-4BEE-9500-7398E4DB929B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "088450C4-9C6F-4651-8D59-C36F1B0601BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA35C066-90A9-4DE2-A97A-38A6CFC59A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "462EEAD5-A78C-4381-847E-B6F1BE4CB379", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E666A5E4-4CDD-4915-B0F3-C63998D01846", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F7AD12A-26C9-48AD-A32A-0F56545DF8E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "73C45BB0-C0DB-42B8-A238-B81D836CF91E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "297226F7-05CB-4721-9D02-51FE2919D2DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D3F9D4D-2116-49A7-9292-AF6B4456E175", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EAA90-B24A-45E7-B99F-DA3554A16F92", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "446F2959-C42B-403B-AE1C-BA7D305C60CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B24C0071-58F9-4971-951B-7AA12294F7D9", "versionEndIncluding": "1.0.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73EC33AB-E92A-4AA8-A523-C341133BB515", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53197903-0614-4460-8944-C1B5257D71A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*", "matchCriteriaId": "EB051A5C-5F66-4732-949A-48B0FDE4AFF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F037B05F-6F92-4BE1-B672-F677CBEFD075", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD6D27-1335-44EF-8B69-A9163A67BC2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A6BFEAE8-0118-4548-A6EA-E90FA8FE7AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*", "matchCriteriaId": "87489138-7756-453C-A149-F2C4F95EFF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "42049891-38B7-4BB7-8DA5-A87169E2D958", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "07139DF7-C36B-4FED-8558-7FA49BE0BCFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E0D7307-5946-45DC-88D3-6BC72EF50184", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2786E370-6108-4695-B0A8-9F19D8E3C0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4D69FD9-F162-4623-A475-9FA7A3A6DF30", "versionEndIncluding": "6.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFBF029A-103D-4BB6-B037-25EC2224DF34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D00C4D90-3697-4F3F-8FFF-FE63F3AD0DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "35A717A5-60C2-4470-943E-CA53781D4B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0E8FBC02-7F2F-4AEF-A5A3-E283D192937C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "29AA2B37-BF5F-4AC5-844D-34CF56EC621C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "07131E56-53EE-4CE1-A135-050792EA3C1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "86334051-8763-4CD9-9480-CAEAE756DFCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "66596F04-9C2E-4091-85A7-40239F3F920E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E831531-60FE-4DFC-994E-7409E6C69D43", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*", "matchCriteriaId": "4C1A275E-2152-4A37-8CFE-34E8900E3426", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B7A688A2-3E9C-4AA3-832B-300A5A311C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "89098CFF-4696-4BD9-9BC9-D7C2D92FE729", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A30DFFE7-EB73-4A88-A23B-9B386C091314", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*", "matchCriteriaId": "25F1481E-A07D-4913-BCF3-630561F0FBC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C230D-7BAA-4A77-9E96-B1B994F4AAC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD0FE7C5-2C46-4B59-9242-A03B986C07DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*", "matchCriteriaId": "FC8F9694-8556-4990-A867-592D6A927498", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*", "matchCriteriaId": "0C605123-69F9-44AC-A17E-3C728059E628", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*", "matchCriteriaId": "37595A89-52C5-4699-A463-C9D91B91716B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53FBB074-4EAC-4CEC-AFC5-33C66B135F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*", "matchCriteriaId": "41B54C61-FB19-4900-A635-2F6B63BEC88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "525D50A3-2943-4B96-B354-F81F814A7707", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*", "matchCriteriaId": "B4BCB22F-7B9A-493B-AE19-18D0C15EA778", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "294B621F-6C1A-4571-AE13-49495680D255", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*", "matchCriteriaId": "33D6D4DD-13D2-4EA0-A7D7-367C3809ABAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "FCF51A7F-59DA-4F64-A4F7-3A250C950D0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7BA47458-E783-4A6A-ABF1-59E8D87E9B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*", "matchCriteriaId": "559D2177-ECB9-4AFF-A8B4-BCB47A1B4637", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*", "matchCriteriaId": "51C6D608-64DE-4CC4-9869-3342E8FD707F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*", "matchCriteriaId": "DDEAB605-03F6-4968-8A48-126C7C711043", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "16A1141D-9718-4A22-8FF2-AEAD28E07291", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*", "matchCriteriaId": "AE2ADE72-4F19-4E73-AC3E-7038FE0D38B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "D75ED54E-8E55-48BF-A52E-19FCCE895C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*", "matchCriteriaId": "B27D214D-2BEF-4445-802A-5E02E9E5E5CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "B53297E3-0C74-421B-8058-DAF7357D421A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "ACDEFCEF-F943-449B-91D8-A8CB290C7AFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "97957D6F-0249-4814-8755-5C4537B58E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "89329F80-7134-4AB2-BDA3-E1B887F633B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4408849A-21F1-40F5-A528-0BD47E1BF823", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*", "matchCriteriaId": "0692E537-A36E-470B-BECE-A17D531B925C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9938CB4F-96D1-4852-9694-28A93E13AA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCB61760-87FD-4E60-ADC6-407EFA13773C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FBDE6D5-7131-421A-BABE-32F281615597", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "89AA4FEF-FF8F-4706-89BC-8396F7614EB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFC6B629-30B3-4C45-B5E9-1B4310F186FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el controlador VMware Descheduled Time Accounting en VMware Workstation v6.5.1 y anteriores, VMware Player v2.5.1 y anteriores, VMware ACE v2.5.1 y anteriores, VMware Server v1.x anteriores a v1.0.9 build 156507 y v2.x anteriores a v2.0.1 build 156745, VMware Fusion v2.x anteriores a v2.0.2 build 147997, VMware ESXi v3.5, y VMware ESX v3.0.2, v3.0.3, y v3.5, cuando el servicio Descheduled Time Accounting no se est\u00e1 ejecutando, permite a usuarios invitados del sistema operativo en Windows provocar una denegaci\u00f3n de servicio mediante vectores desconocidos." } ], "id": "CVE-2009-1805", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-01T19:30:00.203", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35269" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35141" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022300" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1452" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-16 18:15
Modified
2024-11-21 05:32
Severity ?
Summary
Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM." }, { "lang": "es", "value": "Linux Guest VMs ejecutado en VMware Workstation (versiones 15.x anteriores a 15.5.2) y Fusion (versiones 11.x anteriores a 11.5.2), contienen una vulnerabilidad de escalada de privilegios locales debido a permisos de archivo inapropiados en Cortado Thinprint. Los atacantes locales con acceso no administrativo a una M\u00e1quina Virtual invitada de Linux con impresi\u00f3n virtual habilitada pueden explotar este problema para elevar sus privilegios para rootear en la misma m\u00e1quina virtual invitada." } ], "id": "CVE-2020-3948", "lastModified": "2024-11-21T05:32:00.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-16T18:15:12.527", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0004.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-15 18:29
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0006.html | Patch, Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-19-369/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-19-369/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7A2CFA-E5C0-49F9-8E60-0965AEBE364D", "versionEndExcluding": "14.1.6", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D75366-3750-458A-BAF4-6DC91CC08948", "versionEndExcluding": "15.0.3", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion." }, { "lang": "es", "value": "La actualizaciones de VMware ESXi (versiones 6.7 anteriores a ESXi670-201904101-SG y 6.5 anteriores a ESXi650-201903001), Workstation (versiones 15.x anteriores a 15.0.3 y 14.x anteriores a 14.1.6), Fusion (versiones 11.x anteriores a 11.0.3 y 10.x anteriores a 10.1.6) abordan una vulnerabilidad de fuera de l\u00edmites. La explotaci\u00f3n de este problema requiere que un atacante tenga acceso a una m\u00e1quina virtual con gr\u00e1ficos 3D habilitados. La explotaci\u00f3n exitosa de este problema puede conducir a la divulgaci\u00f3n de informaci\u00f3n. La soluci\u00f3n a este problema consiste en desactivar la funci\u00f3n de aceleraci\u00f3n 3D. Esta funci\u00f3n no est\u00e1 activada de forma predeterminada en ESXi y est\u00e1 activada de forma predeterminada en Workstation y Fusion." } ], "id": "CVE-2019-5520", "lastModified": "2024-11-21T04:45:06.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-15T18:29:01.223", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "source": "security@vmware.com", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-369/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-369/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-09 20:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6966.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/104709 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041208 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0016.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104709 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041208 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0016.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C4E179-64D8-44F4-A60E-2C67268669C1", "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CD4990A-14DD-414B-8946-680D7BF5D29E", "versionEndExcluding": "14.1.2", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6965 and CVE-2018-6966." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-201806401-BG), Workstation (versiones 14.x anteriores a la 14.1.2) y Fusion (versiones 10.x anteriores a la 10.1.2) contienen una vulnerabilidad de lectura fuera de l\u00edmites en el traductor del shader. Si este error se explota de manera exitosa, podr\u00eda dar lugar a una divulgaci\u00f3n de informaci\u00f3n o podr\u00eda permitir que atacantes con privilegios de usuario normal provoquen el cierre inesperado de sus m\u00e1quinas virtuales. Esta vulnerabilidad es diferente de CVE-2018-6965 y CVE-2018-6966." } ], "id": "CVE-2018-6967", "lastModified": "2024-11-21T04:11:29.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-09T20:29:01.127", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104709" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041208" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-11 14:29
Modified
2024-11-21 03:26
Severity ?
Summary
VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/102489 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040161 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0005.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102489 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040161 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0005.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | workstation | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EE84B0E-1550-4DE8-9454-AF2F51CDE208", "versionEndExcluding": "8.5.10", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7419FA0-119C-4C1C-A071-90A9F8ECDB32", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD8033E5-38A7-4262-8FB0-937534F4C41F", "versionEndExcluding": "12.5.9", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D13A3189-D26A-4F29-9C49-6083F5951B81", "versionEndExcluding": "14.1.1", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default." }, { "lang": "es", "value": "VMware Workstation y Fusion contienen una vulnerabilidad de uso de memoria previamente liberada en el servicio VMware NAT cuando el modo IPv6 est\u00e1 habilitado. Este problema puede permitir que un invitado ejecute c\u00f3digo en el host. Nota: El modo IPv6 para VMNAT no est\u00e1 habilitado por defecto." } ], "id": "CVE-2017-4949", "lastModified": "2024-11-21T03:26:44.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-11T14:29:00.213", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102489" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040161" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-15 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/100842 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1039367 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1039368 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100842 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039367 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039368 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0015.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | workstation | * | |
vmware | workstation_pro | * | |
vmware | fusion | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "matchCriteriaId": "4DC223AC-EB3D-48CF-A6CC-D35E00A38394", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "matchCriteriaId": "75C8E87E-A869-49F8-89F9-DE64A45CDB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "matchCriteriaId": "E7F8878C-F73D-4549-9607-74880176D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "matchCriteriaId": "E47D369F-13B2-42B3-BB74-60AAD0954B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:550-20170901001s:*:*:*:*:*:*", "matchCriteriaId": "45551873-2E14-4324-9946-C22079F7D0D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "436F87D0-646B-44D8-ADB8-444D87971644", "versionEndExcluding": "12.5.3", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "119CB5C4-DCF8-492C-924C-5FC46CE5463E", "versionEndExcluding": "12.5.3", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D9E1FD-5D56-48E9-A09B-84CF4A9175EB", "versionEndExcluding": "8.5.4", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs." }, { "lang": "es", "value": "VMware ESXi 6.5 sin el parche ESXi650-201707101-SG, ESXi 6.0 sin el parche ESXi600-201706101-SG, ESXi 5.5 sin el parche ESXi550-201709101-SG, Workstation (en versiones 12.x anteriores a la 12.5.3) y Fusion (en versiones 8.x anteriores a la 8.5.4) contienen una vulnerabilidad de desreferencia de puntero NULL. Este problema ocurre cuando se gestionan peticiones RPC por parte de un invitado. Si se explota esta vulnerabilidad con \u00e9xito, los atacantes con privilegios de usuario normal podr\u00edan provocar el cierre inesperado de sus m\u00e1quinas virtuales." } ], "id": "CVE-2017-4925", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-15T13:29:00.243", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100842" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039367" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039368" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/75095 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032529 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032530 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75095 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032529 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 6.0.5 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.0.1 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | player | 6.0.5 | |
vmware | player | 7.0 | |
vmware | player | 7.1 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | workstation | 10.0.5 | |
vmware | workstation | 11.0 | |
vmware | workstation | 11.1 | |
vmware | horizon_client | 3.2.0 | |
vmware | horizon_client | 3.3 | |
vmware | horizon_view_client | 5.4 | |
vmware | horizon_view_client | 5.4.1 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "85A09E65-9C4C-42FD-A1B0-E925A905875A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7EF002E-10E1-4405-8C55-BD91AD45B891", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "93872771-BD86-4707-926B-F6C3577C33A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8903-B853-43A2-88C3-D79BBA70F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71B0563B-F300-448D-8450-9B7B862F4560", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "492D7AD2-D660-48F5-A9BE-28CCA6A6B658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "90F0250C-EE18-486B-90D7-348FEF01C2D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C7BA06B-60FB-456B-A4BF-401F82E88BBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E82AFF09-F9F6-486B-9299-3852EBD9B333", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9391EA21-2A10-445A-B88A-103025C9A343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TPView.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors, a different vulnerability than CVE-2012-0897." }, { "lang": "es", "value": "TPView.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado ejecutar c\u00f3digo arbitrario sobre el sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-0897." } ], "id": "CVE-2015-2336", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-13T14:59:00.077", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75095" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-02 15:29
Modified
2024-11-21 04:45
Severity ?
Summary
VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) and Fusion (11.x before 11.0.3, 10.x before 10.1.6) updates address an out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.securityfocus.com/bid/107634 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-19-306/ | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-19-516/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.securityfocus.com/bid/107634 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-19-306/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-19-516/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7A2CFA-E5C0-49F9-8E60-0965AEBE364D", "versionEndExcluding": "14.1.6", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D75366-3750-458A-BAF4-6DC91CC08948", "versionEndExcluding": "15.0.3", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) and Fusion (11.x before 11.0.3, 10.x before 10.1.6) updates address an out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest." }, { "lang": "es", "value": "Las actualizaciones de VMware Workstation (en las versiones 15.x anteriores a a la 15.0.3, y las 14.x anteriores a la 14.1.6) y de Fusion (en las versiones 11.x anteriores a a la 11.0.3, y las 10.x anteriores a la 10.1.6) abordan una vulnerabilidad de escritura fuera de l\u00edmites en los adaptadores de red virtual e1000 y e1000e. La explotaci\u00f3n de este problema podr\u00eda conducir a una ejecuci\u00f3n de c\u00f3digo en el host desde el invitado, pero es m\u00e1s probable que resulte en una denegaci\u00f3n de servicio (DoS) de esta.." } ], "id": "CVE-2019-5515", "lastModified": "2024-11-21T04:45:05.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-02T15:29:00.510", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/107634" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-306/" }, { "source": "security@vmware.com", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-516/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/107634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-306/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-516/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-12-29 09:59
Modified
2025-04-12 10:46
Severity ?
Summary
VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/93888 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1037103 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2016-0017.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93888 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037103 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2016-0017.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "25BBD4C7-C851-4D40-B6DD-92873319CD28", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDD345B3-810C-41D1-82CE-0CA0B4B1F5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors." }, { "lang": "es", "value": "VMware Fusion 8.x en versiones anteriores a 8.5 en OS X, cuando System Integrity Protection (SIP) est\u00e1 habilitado, permite a usuarios locales determinar las direcciones de memoria del kernel y eludir el mecanismo de protecci\u00f3n kASLR a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-5329", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-29T09:59:00.227", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93888" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1037103" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-14 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2012-0011.html | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2012-0011.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.0 | |
vmware | workstation | 7.0.1 | |
vmware | workstation | 7.1 | |
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
vmware | workstation | 7.1.3 | |
vmware | workstation | 7.1.4 | |
vmware | workstation | 7.1.4.16648 | |
vmware | workstation | 7.1.5 | |
vmware | workstation | 8.0 | |
vmware | workstation | 8.0.1 | |
vmware | workstation | 8.0.2 | |
vmware | workstation | 8.0.3 | |
vmware | player | 3.0 | |
vmware | player | 3.0.1 | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
vmware | player | 3.1.3 | |
vmware | player | 3.1.4 | |
vmware | player | 3.1.5 | |
vmware | player | 4.0 | |
vmware | player | 4.0.1 | |
vmware | player | 4.0.2 | |
vmware | player | 4.0.3 | |
vmware | fusion | 4.0 | |
vmware | fusion | 4.0.1 | |
vmware | fusion | 4.0.2 | |
vmware | fusion | 4.1 | |
vmware | fusion | 4.1.1 | |
vmware | fusion | 4.1.2 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 | |
vmware | esxi | 3.5 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34F436D4-B7B7-43CB-A2BD-C5E791F7E3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF53DB66-4C79-47BB-AABD-6DCE2EF98E1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C8C76F3-05B5-43EA-AE70-A026AC6001DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.4.16648:*:*:*:*:*:*:*", "matchCriteriaId": "6205C8AE-63AB-4501-B311-30A9F806DC82", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "019FEA3B-970B-4959-A500-D9AD39C58C11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "21644868-F1B0-4A8E-BE73-4F42BEB8E834", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F747AC1-E163-41A4-BAC7-FDF46F4057D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A115959-9CDA-45ED-9002-BA1A31074E81", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DAA72ED8-3229-4220-BE75-712CA6E21062", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57E06DA2-CB18-45E6-9F88-B3B6E0507816", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "EB9D2803-D06D-4CD6-98D5-0E74CFC13B99", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D5FD2D7-9928-437B-8988-4FC955DE4F84", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "60234129-7F7F-49FA-A425-CDAB4D09AB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4FB73EC4-F3CE-428B-BA40-47FB21181543", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "927863C2-5A61-4137-83AC-6CF3F2958941", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F74559CB-6E52-421F-88F3-739913C26C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4870DAA2-6670-47EF-BF74-6E39B92E75DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "70C64B80-4928-4ABA-AF4E-1977C252BAEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29100-E124-4416-95CF-18B4246D43F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*", "matchCriteriaId": "37A5D726-3D38-44D5-B509-1B8B003903A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*", "matchCriteriaId": "A4DA3B20-A743-4F37-A095-65161FFBEB73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*", "matchCriteriaId": "FF7C3C65-BE63-407E-9CFD-E571025C3E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FAE88D8C-9CC3-46D1-9F26-290BC679F47E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*", "matchCriteriaId": "58ED8AB4-0FDF-4752-B44E-56F58593CE41", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file." }, { "lang": "es", "value": "VMware Workstation v7.x antes de v7.1.6 y v8.x antes de v8.0.4, VMware Player v3.x antes de v3.1.6 y v4.x antes de v4.0.4, VMware Fusion v4.x antes de 4.1.3, VMware ESXi v3.5 a v5.0 y VMware ESX v3.5 a v4.1 permite ejecutar c\u00f3digo de su elecci\u00f3n en el sistema operativo anfitri\u00f3n a atacantes remotos (con cierta ayuda de usuarios locales) o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de memoria) en el sistema operativo anfitri\u00f3n a trav\u00e9s de un archivo Checkpoint modificado." } ], "id": "CVE-2012-3288", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-06-14T20:55:01.420", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-29 20:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | horizon_client | * | |
vmware | remote_console | * | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9D288-3370-41AB-BB69-B5A6A91FC582", "versionEndIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:remote_console:*:*:*:*:*:*:*:*", "matchCriteriaId": "4385CDD4-5D94-4B3A-8D86-FCD568813509", "versionEndIncluding": "11.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior) and VMware Horizon Client for Mac (5.x and prior) contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service opener. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC and Horizon Client are installed." }, { "lang": "es", "value": "VMware Fusion (versiones 11.x anteriores a 11.5.5), VMware Remote Console para Mac (versiones anteriores a 11.x ) y VMware Horizon Client para Mac (versiones anteriores a 5.x), contienen una vulnerabilidad de escalada de privilegios local debido a un problema de tipo Time-of-check Time-of-use (TOCTOU) en el abridor de servicio. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a atacantes con privilegios de usuario normal escalar sus privilegios a root en el sistema donde est\u00e1n instalados Fusion, VMRC y Horizon Client." } ], "id": "CVE-2020-3957", "lastModified": "2024-11-21T05:32:02.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-29T20:15:11.547", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-20 17:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's vmx process or corrupt hypervisor's memory heap.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esxi | 7.0.0 | |
vmware | esxi | 7.0.0 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | workstation_player | * | |
vmware | fusion | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:1.20.16321839:*:*:*:*:*:*", "matchCriteriaId": "0DB30686-F9E0-4845-BFB6-713043B35736", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", "matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", "matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", "matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", "matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", "matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", "matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", "matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", "matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", "matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", "matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", "matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", "matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", "matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", "matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", "matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", "matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", "matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", "matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", "matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", "matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", "matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", "matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", "matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", "matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", "matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*", "matchCriteriaId": "6431DD1F-2269-4AFB-B486-9B6373F41C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*", "matchCriteriaId": "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*", "matchCriteriaId": "A86BDAB4-3924-45A8-9130-517DEA184FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*", "matchCriteriaId": "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", "matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*", "matchCriteriaId": "C565246C-896C-4E48-8C24-344C9B0A3057", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*", "matchCriteriaId": "8479F377-4F47-433D-867D-A94A4B0E46EC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD43625B-DBC4-460B-A7DA-F1EA254806DB", "versionEndExcluding": "3.10.1", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2A68886-4079-4BE1-9E51-6022ED680B86", "versionEndExcluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:pro:*:*:*", "matchCriteriaId": "6379C7C4-38B7-4A40-BAA4-D99A760E6FF6", "versionEndIncluding": "15.5.6", "versionStartIncluding": "15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "514A55BF-11F2-4ECE-BAD5-DEA9A4FADC40", "versionEndIncluding": "15.5.6", "versionStartIncluding": "15.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF0DDB53-0355-48F7-AE05-DCACBB14F6F8", "versionEndExcluding": "11.5.6", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine\u0027s vmx process or corrupt hypervisor\u0027s memory heap." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.1-0.0.16850804, versiones 6.7 anteriores a ESXi670-202008101-SG, versiones 6.5 anteriores a ESXi650-202007101-SG), Workstation (versiones 15.x), Fusion (versiones 11.x anteriores a de 11.5.6), contienen una vulnerabilidad de escritura fuera de l\u00edmites debido a un problema time-of-check time-of-use en el dispositivo ACPI.\u0026#xa0;Un actor malicioso con acceso administrativo a una m\u00e1quina virtual puede ser capaz de explotar esta vulnerabilidad para bloquear el proceso vmx de la m\u00e1quina virtual o corromper la pila de la memoria del hipervisor" } ], "id": "CVE-2020-3982", "lastModified": "2024-11-21T05:32:06.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-20T17:15:12.733", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-783/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-783/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a heap-overflow due to a race condition issue in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker\u0027s control must be present for exploitation to be possible." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.2) y Fusion (versiones 11.x anteriores a 11.5. 2), contiene un desbordamiento de la pila debido a un problema de condici\u00f3n de carrera en el controlador USB 2.0 (EHCI). Un actor malicioso con acceso local a una m\u00e1quina virtual puede ser capaz de explotar esta vulnerabilidad para ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual. Unas condiciones adicionales m\u00e1s all\u00e1 del control del atacante deben estar presentes para que la explotaci\u00f3n puedan ser posible" } ], "id": "CVE-2020-3966", "lastModified": "2024-11-21T05:32:04.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.257", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-783/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-783/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-12 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
cve@mitre.org | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39198 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39206 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.securitytracker.com/id?1023832 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023833 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39198 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39206 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023832 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023833 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 6.5.0 | |
vmware | workstation | 6.5.1 | |
vmware | workstation | 6.5.2 | |
vmware | workstation | 6.5.3 | |
microsoft | windows | * | |
vmware | player | 2.5 | |
vmware | player | 2.5.1 | |
vmware | player | 2.5.2 | |
vmware | player | 2.5.3 | |
microsoft | windows | * | |
vmware | ace | 2.5.0 | |
vmware | ace | 2.5.1 | |
vmware | ace | 2.5.2 | |
vmware | ace | 2.5.3 | |
microsoft | windows | * | |
vmware | server | 2.0.0 | |
vmware | server | 2.0.1 | |
vmware | server | 2.0.2 | |
microsoft | windows | * | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | fusion | 2.0.3 | |
vmware | fusion | 2.0.4 | |
vmware | fusion | 2.0.5 | |
vmware | fusion | 3.0 | |
microsoft | windows | * | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
microsoft | windows | * | |
vmware | esx | 2.5.5 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5674C3DD-F510-4701-ACA8-437576307528", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E62960B2-91AE-4DD7-8085-9BA6BCB84473", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBCA2A03-0A31-4290-987A-BE715758BA95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "26B7268F-A170-4366-9196-E73A956883DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B037838B-072E-4676-9E5D-86F5BC207512", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share." }, { "lang": "es", "value": "VMware Tools en VMware Workstation v6.5.x before v6.5.4 build v246459; VMware Player v2.5.x anterior a v2.5.4 build 246459; VMware ACE v2.5.x anterior a v2.5.4 build 246459; VMware Server v2.x anterior a v2.0.2 build 203138; VMware Fusion v2.x anterior a v2.0.6 build 246742; VMware ESXi v3.5 y v4.0; y VMware ESX 2.5.5, 3.0.3, 3.5, y 4.0 no accede adecuadamente a las bibliotecas de acceso, lo cual permite a atacantes remotos ayudados por usuarios ejecutar c\u00f3digo a su elecci\u00f3n al enga\u00f1ar a un usuario en un cliente Windows OS a hacer clic en un archivo que se almacena en un recurso compartido de red." } ], "id": "CVE-2010-1141", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-04-12T18:30:00.663", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39198" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023832" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023833" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7020" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-29 20:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.5.2) and VMware Fusion (11.x before 11.5.2) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine's vmx process leading to a denial of service condition.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957 | Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0011.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0011.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.5.2) and VMware Fusion (11.x before 11.5.2) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with non-administrative access to a virtual machine to crash the virtual machine\u0027s vmx process leading to a denial of service condition." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), VMware Workstation (versiones 15.x anteriores a 15.5.2) y VMware Fusion (versiones 11.x anteriores a 11.5.2), contienen una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad shader. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a atacantes con acceso no administrativo a una m\u00e1quina virtual bloquear el proceso vmx de la m\u00e1quina virtual, conllevando a una condici\u00f3n de denegaci\u00f3n de servicio." } ], "id": "CVE-2020-3958", "lastModified": "2024-11-21T05:32:02.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-29T20:15:11.610", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-16 17:15
Modified
2024-11-21 05:49
Severity ?
Summary
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation_player | * | |
vmware | workstation_pro | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "28769D3C-0C46-4E6B-A8E2-75A7B64B1D47", "versionEndExcluding": "3.11", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBED072F-DE79-41C6-AD4F-02E10BD27FBD", "versionEndExcluding": "4.4", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "6735BF82-477F-498C-90E6-A744DECEEB1E", "versionEndExcluding": "12.2.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "004F4859-2B2B-472E-A135-122B46BBE427", "versionEndExcluding": "16.2.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A4C2DD-155D-41F0-9A03-40FD949BDBCD", "versionEndExcluding": "16.2.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202202401:*:*:*:*:*:*", "matchCriteriaId": "4C47BEFC-1434-4676-A123-359A500F19BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", "matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", "matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", "matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", "matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", "matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", "matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", "matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", "matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", "matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", "matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", "matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", "matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", "matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", "matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", "matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", "matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", "matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", "matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", "matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", "matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", "matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", "matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", "matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", "matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", "matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*", "matchCriteriaId": "6431DD1F-2269-4AFB-B486-9B6373F41C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*", "matchCriteriaId": "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*", "matchCriteriaId": "A86BDAB4-3924-45A8-9130-517DEA184FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*", "matchCriteriaId": "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201911001:*:*:*:*:*:*", "matchCriteriaId": "2130E67D-7F2A-4D82-BEFD-BA42B6B6FDA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", "matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*", "matchCriteriaId": "18E8632C-E442-4F18-BFE2-96AE5C839F0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202011001:*:*:*:*:*:*", "matchCriteriaId": "13D69B99-CB36-45DD-9FD9-C58186998200", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202011002:*:*:*:*:*:*", "matchCriteriaId": "EF0BC157-1834-46D8-9BF9-0CE9648C7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202102001:*:*:*:*:*:*", "matchCriteriaId": "728136B6-47A7-42BC-9464-7745E4F2B4FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202103001:*:*:*:*:*:*", "matchCriteriaId": "3967967A-E0A5-45B3-999C-D749A9B0C791", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202111101:*:*:*:*:*:*", "matchCriteriaId": "644588BB-2A6D-481C-9B2F-756C23B989DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de uso de memoria previamente liberada en el controlador USB XHCI. Un actor malicioso con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que es ejecutada en el host" } ], "id": "CVE-2021-22040", "lastModified": "2024-11-21T05:49:29.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-16T17:15:10.413", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-05 18:15
Modified
2025-05-07 15:35
Severity ?
9.3 (Critical) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | fusion | * | |
apple | macos | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D725D84-6426-459F-9B49-ADE7A13FA19A", "versionEndIncluding": "5.0", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0BFB423-5C6D-40F3-960A-53D9955E7621", "versionEndExcluding": "17.5.1", "versionStartIncluding": "17.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*", "matchCriteriaId": "BC6F088D-0404-4588-9788-7A5903C5BC82", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50649AB8-57FD-4210-A7F4-3AD7D00F6A91", "versionEndExcluding": "13.5.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed." }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de Use After Free en el controlador USB UHCI. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host. En ESXi, la explotaci\u00f3n est\u00e1 contenida dentro del entorno limitado de VMX, mientras que, en Workstation y Fusion, esto puede provocar la ejecuci\u00f3n de c\u00f3digo en la m\u00e1quina donde est\u00e1 instalado Workstation o Fusion." } ], "id": "CVE-2024-22253", "lastModified": "2025-05-07T15:35:46.910", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 6.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-05T18:15:47.920", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-04 22:15
Modified
2024-11-21 05:49
Severity ?
Summary
VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2022-0001.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-22-003/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2022-0001.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-003/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD9C21-C9E9-45EB-8370-B499C0B9290A", "versionEndIncluding": "3.10.2.2", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "326A2867-797D-4AA9-8D2C-43E8CDA0BCFC", "versionEndIncluding": "4.3.1", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "C60BB77E-04F4-444A-9664-EFC2E33F1C65", "versionEndExcluding": "16.2.0", "versionStartIncluding": "16.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE0A2B22-5AF1-4CC6-A4E4-57A9B785E28A", "versionEndExcluding": "12.2.0", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*", "matchCriteriaId": "C565246C-896C-4E48-8C24-344C9B0A3057", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*", "matchCriteriaId": "8479F377-4F47-433D-867D-A94A4B0E46EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202010001:*:*:*:*:*:*", "matchCriteriaId": "ECC2468D-6B23-4C7E-951B-DDA8DD17B51E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202011001:*:*:*:*:*:*", "matchCriteriaId": "2CB7210B-C9FC-41FA-A258-1F6EC737E9BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202011002:*:*:*:*:*:*", "matchCriteriaId": "3279299C-37AD-47DF-B22A-20562D13AD80", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202102001:*:*:*:*:*:*", "matchCriteriaId": "91032EB0-AC08-459A-8D78-C7412AE64E3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202102002:*:*:*:*:*:*", "matchCriteriaId": "7C5987AE-6E37-4470-A192-5E2F1C999F8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202102003:*:*:*:*:*:*", "matchCriteriaId": "F603C437-FC49-4CCA-8A1A-3264CAE794B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202107401:*:*:*:*:*:*", "matchCriteriaId": "BA34EFDD-DA04-415D-93B8-E5B35EF8A5F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201911001:*:*:*:*:*:*", "matchCriteriaId": "2130E67D-7F2A-4D82-BEFD-BA42B6B6FDA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", "matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*", "matchCriteriaId": "18E8632C-E442-4F18-BFE2-96AE5C839F0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202011001:*:*:*:*:*:*", "matchCriteriaId": "13D69B99-CB36-45DD-9FD9-C58186998200", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202011002:*:*:*:*:*:*", "matchCriteriaId": "EF0BC157-1834-46D8-9BF9-0CE9648C7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202102001:*:*:*:*:*:*", "matchCriteriaId": "728136B6-47A7-42BC-9464-7745E4F2B4FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202103001:*:*:*:*:*:*", "matchCriteriaId": "3967967A-E0A5-45B3-999C-D749A9B0C791", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202111001:*:*:*:*:*:*", "matchCriteriaId": "8220EA95-39E0-46FA-98B2-5C793E3CE1CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0, 6.7 anteriores a ESXi670-202111101-SG y 6.5 anteriores a ESXi650-202110101-SG), VMware Workstation (versi\u00f3n 16.2.0) y VMware Fusion (versi\u00f3n 12.2.0), contienen una vulnerabilidad de desbordamiento de pila en la emulaci\u00f3n de dispositivos de CD-ROM. Un actor malicioso con acceso a una m\u00e1quina virtual con emulaci\u00f3n de dispositivo de CD-ROM puede ser capaz de explotar esta vulnerabilidad en conjunto con otros problemas para ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual" } ], "id": "CVE-2021-22045", "lastModified": "2024-11-21T05:49:29.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-04T22:15:07.467", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-003/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-20 17:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | workstation | * | |
vmware | esxi | 7.0.0 | |
vmware | esxi | 7.0.0 | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD43625B-DBC4-460B-A7DA-F1EA254806DB", "versionEndExcluding": "3.10.1", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2A68886-4079-4BE1-9E51-6022ED680B86", "versionEndExcluding": "4.1", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC7F7324-504A-4597-ABF9-326D370A4CF1", "versionEndIncluding": "15.5.6", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:1.20.16321839:*:*:*:*:*:*", "matchCriteriaId": "0DB30686-F9E0-4845-BFB6-713043B35736", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF0DDB53-0355-48F7-AE05-DCACBB14F6F8", "versionEndExcluding": "11.5.6", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*", "matchCriteriaId": "C565246C-896C-4E48-8C24-344C9B0A3057", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*", "matchCriteriaId": "8479F377-4F47-433D-867D-A94A4B0E46EC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", "matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", "matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", "matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", "matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", "matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", "matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", "matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", "matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", "matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", "matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", "matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", "matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", "matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", "matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", "matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", "matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", "matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", "matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", "matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", "matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", "matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", "matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", "matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", "matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", "matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*", "matchCriteriaId": "6431DD1F-2269-4AFB-B486-9B6373F41C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*", "matchCriteriaId": "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*", "matchCriteriaId": "A86BDAB4-3924-45A8-9130-517DEA184FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*", "matchCriteriaId": "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", "matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.1-0.0.16850804, versiones 6.7 anteriores a ESXi670-202008101-SG, versiones 6.5 anteriores a ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x antes de 11.5.6), contienen una vulnerabilidad de lectura fuera de l\u00edmites debido a un problema time-of-check time-of-use en el dispositivo ACPI.\u0026#xa0;Un actor malicioso con acceso administrativo a una m\u00e1quina virtual puede ser capaz de explotar este problema para filtrar la memoria del proceso vmx" } ], "id": "CVE-2020-3981", "lastModified": "2024-11-21T05:32:06.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-20T17:15:12.670", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-21 16:15
Modified
2025-08-08 10:32
Severity ?
Summary
VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0029.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0029.html | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "22C19FF0-3E38-4717-9044-092EF9C4C486", "versionEndExcluding": "15.5.7", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "142A21C9-7071-4191-B8FC-F8955A40DBD9", "versionEndExcluding": "11.5.7", "versionStartIncluding": "11.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine\u0027s vmx process leading to a denial of service condition." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi70U1c-17325551), VMware Workstation (versiones 16.x anteriores a 16.0 y versiones 15.x anteriores a 15.5.7), VMware Fusion (versiones 12.x anteriores a 12.0 y versiones 11.x anteriores a 11.5.7) y VMware Cloud Foundation contienen una vulnerabilidad de denegaci\u00f3n de servicio debido a una comprobaci\u00f3n inapropiada de la entrada en GuestInfo.\u0026#xa0;Un actor malicioso con acceso privilegiado de usuario normal para una m\u00e1quina virtual puede bloquear el proceso vmx de la m\u00e1quina virtual y causar una condici\u00f3n de denegaci\u00f3n de servicio" } ], "id": "CVE-2020-3999", "lastModified": "2025-08-08T10:32:53.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-21T16:15:13.177", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 14:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/105882 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1042055 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0027.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105882 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1042055 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0027.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | workstation | 15.0.0 | |
vmware | fusion | * | |
vmware | fusion | 11.0.0 | |
apple | mac_os_x | - | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DA75D1C-1171-417D-9B05-CDFC693228FE", "versionEndExcluding": "14.1.4", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:15.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5CE7651-F5D0-449A-9BDB-E524153297F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7FA4899-D45D-407A-A8EC-C4247088FDC0", "versionEndExcluding": "10.1.4", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC3F6D23-B5D3-457E-BDB8-A08407F5896C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*", "matchCriteriaId": "0BC70488-A435-43BE-AEF4-30CBA36CBC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may lead to an information leak from host to guest." }, { "lang": "es", "value": "VMware ESXi 6.7 sin ESXi670-201811401-BG y VMware ESXi 6.5 sin ESXi650-201811301-BG contiene un uso de memoria de la pila no inicializada en el adaptador de red virtual vmxnet3, lo que podr\u00eda conducir a una fuga de informaci\u00f3n del host al invitado." } ], "id": "CVE-2018-6982", "lastModified": "2024-11-21T04:11:31.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T14:29:00.857", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105882" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042055" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-02 21:30
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/30476 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/492831/100/0/threaded | ||
cve@mitre.org | http://www.securitytracker.com/id?1020148 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2008-0008.html | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1707/references | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/42753 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30476 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/492831/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0008.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1707/references | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/42753 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | ace_2 | 2.0 | |
vmware | ace_2 | 2.01 | |
vmware | fusion | 1.1 | |
vmware | fusion | 1.1.1 | |
vmware | vmware_player_2 | 2.0 | |
vmware | vmware_player_2 | 2.01 | |
vmware | vmware_player_2 | 2.02 | |
vmware | vmware_player_2 | 2.03 | |
vmware | vmware_workstation | 6.0.1 | |
vmware | vmware_workstation | 6.0.2 | |
vmware | vmware_workstation | 6.03 | |
vmware | workstation | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace_2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8476A347-FBF2-4235-8483-7365BAF700A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace_2:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "B7AD3DFD-6211-438F-9483-E82B346DBA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3DD1338C-8FC1-40A1-BAE8-B11F4354A0CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC862199-8AA7-4E5E-BA2B-DF5FC9A056BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player_2:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDF5387-1F1B-42AF-B33D-E4392D61D89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player_2:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "6A7B9138-51C8-433D-80B5-70FBB09732DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player_2:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "5CF74F13-1247-4D40-816A-FF5B2E00FAF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_player_2:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "6B6F83E6-1325-4B96-B253-7B031B5BA563", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B7632A4-D120-434D-B35A-303640DB37AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6DFFE01E-BD0A-432E-B47C-D68DAADDD075", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "652DCCCA-2C0F-482F-AD1C-F3913BD3430D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "89329F80-7134-4AB2-BDA3-E1B887F633B0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the VMware Host Guest File System (HGFS) in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, VMware ACE 2 before 2.0.2 build 93057, and VMware Fusion before 1.1.2 build 87978, when folder sharing is used, allows guest OS users to execute arbitrary code on the host OS via unspecified vectors." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el VMware Host Guest File System (HGFS) en VMware Workstation versiones 6 anteriores a 6.0.4 build 93057, VMware Player versiones 2 anteriores a 2.0.4 build 93057, VMware ACE versiones 2 anteriores a 2.0.2 build 93057 y VMware Fusion versiones anteriores a 1.1.2 build 87978, cuando el uso compartido de carpetas es utilizado, permite a los usuarios del SO invitado ejecutar c\u00f3digo arbitrario sobre el SO host por medio de vectores no especificados." } ], "id": "CVE-2008-2098", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-02T21:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30476" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/492831/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020148" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0008.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1707/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/492831/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1707/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42753" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit, Third Party Advisory, VDB Entry | |
security@vmware.com | http://seclists.org/fulldisclosure/2020/Jul/22 | Mailing List, Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Jul/22 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BFA96-7E07-4E05-90A4-45A2F2FC2064", "versionEndExcluding": "3.10", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "02A5A8AC-4C6C-4E95-B730-00783FB79DFF", "versionEndExcluding": "4.0.1", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7448F9A-9D9B-47BC-ACD1-18199A70D148", "versionEndExcluding": "11.5.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "84A3302D-706B-4260-8407-121D7C2F0867", "versionEndExcluding": "15.5.2", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine." }, { "lang": "es", "value": "VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.0-1.20.16321839, versiones 6.7 anteriores a ESXi670-202006401-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.2) y Fusion (versiones 11.x anteriores a 11.5. 2), contiene una filtraci\u00f3n de informaci\u00f3n en el controlador USB XHCI. Un actor malicioso con acceso local a una m\u00e1quina virtual puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria del hipervisor desde una m\u00e1quina virtual" } ], "id": "CVE-2020-3965", "lastModified": "2024-11-21T05:32:04.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.180", "references": [ { "source": "security@vmware.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" }, { "source": "security@vmware.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Jul/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-15 13:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0012.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0012.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.7 | |
vmware | vsphere_esxi | 6.7 | |
vmware | vsphere_esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "771CBCCF-D4DD-496C-9035-BE7262CF64A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "6D115E41-8BCF-40DE-91FF-3E628798E508", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "4446F0C9-9058-477C-913B-7524BA99D797", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "826B35FB-463E-4424-AE91-25BE01F834F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "FACE25FD-7C13-4AB5-AC27-B1AB781AEDDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "8084D8F6-D495-452D-BD55-C515AC58750E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "B9A6A017-A7C5-4E7F-B65A-6F309A184FE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "B0F57EDD-831B-4219-A26D-1636F04CD6EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3477D987-3CA6-4623-8D88-4FBE5EBA7C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "274224EC-AE21-4E89-9F34-D56C1D6FCC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "2607A74F-EDEE-4DC6-BF43-09C62478B9C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "B0BDCA59-38C7-4E8C-89D1-8CD2F432F106", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "8E77CCBC-B104-4A88-90CF-57DC126CC448", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "726C9EF2-7AFB-410A-8EDC-49DCB113AF30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "770D4FA0-4ACC-44F4-96D4-04471DB07118", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "D61873BB-E6F3-4240-B71B-589BD5D3AFBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "6E2CC1EE-B752-40F4-B812-72973AFE655D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "92C790A1-9A34-47AB-A8A3-3B97F7265D90", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "1DD7FAF3-15A4-445A-9B3A-722FD8423E21", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:670-201911001:*:*:*:*:*:*", "matchCriteriaId": "7E417BA1-0441-42CB-96AB-93C52569779C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "ECEBAC19-29B3-4148-BA85-F127D4ED1B0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-202006401-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5.5) contienen una vulnerabilidad de lectura fuera de l\u00edmites en la funcionalidad NVMe. Un actor malicioso con acceso local no administrativo a una m\u00e1quina virtual con un controlador NVMe virtual presente puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria f\u00edsica" } ], "id": "CVE-2020-3960", "lastModified": "2024-11-21T05:32:03.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-15T13:15:07.577", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-20 10:15
Modified
2025-03-07 19:15
Severity ?
6.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during
installation for the first time (the user needs to drag or copy the
application to a folder from the '.dmg' volume) or when installing an
upgrade. A malicious actor with local non-administrative user privileges may
exploit this vulnerability to escalate privileges to root on the system
where Fusion is installed or being installed for the first time.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F574C812-1E1F-4991-9442-74E799DACAD8", "versionEndExcluding": "13.5", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion(13.x prior to 13.5)\u00a0contains a local privilege escalation vulnerability that occurs during \ninstallation for the first time (the user needs to drag or copy the \napplication to a folder from the \u0027.dmg\u0027 volume) or when installing an \nupgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time." }, { "lang": "es", "value": "VMware Fusion (13.x anterior a 13.5) contiene una vulnerabilidad de escalada de privilegios local que ocurre durante la instalaci\u00f3n por primera vez (el usuario necesita arrastrar o copiar la aplicaci\u00f3n a una carpeta desde el volumen \u0027.dmg\u0027) o al instalar una actualizaci\u00f3n. Un actor malicioso con privilegios de usuario local no administrativo puede aprovechar esta vulnerabilidad para escalar privilegios a root en el System donde Fusion est\u00e1 instalado o donde se instala por primera vez." } ], "id": "CVE-2023-34045", "lastModified": "2025-03-07T19:15:35.263", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.2, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-20T10:15:12.787", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-07 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/97160 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97160 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038148 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038149 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2017-0006.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation_player | * | |
vmware | workstation_pro | * | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | fusion | * | |
vmware | fusion_pro | * | |
apple | mac_os_x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB0B91B-F8F6-456F-8FBD-7B98A9ABA95A", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F1AB0A-CD31-4FE7-AE1F-4C6A111D1C62", "versionEndExcluding": "12.5.5", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "BB90FDCA-A848-4D4D-8A6F-FD04D702EC85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*", "matchCriteriaId": "4DC223AC-EB3D-48CF-A6CC-D35E00A38394", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*", "matchCriteriaId": "75C8E87E-A869-49F8-89F9-DE64A45CDB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*", "matchCriteriaId": "E7F8878C-F73D-4549-9607-74880176D2B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*", "matchCriteriaId": "E47D369F-13B2-42B3-BB74-60AAD0954B26", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1671-5010-4BB5-BFA7-217FBB946B59", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB3E0004-E6F1-4C0D-9B24-A7F1AF4BCBD8", "versionEndExcluding": "8.5.6", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "ESXi versiones 6.5 sin el parche ESXi650-201703410-SG, 6.0 U3 sin el parche ESXi600-201703401-SG, 6.0 U2 sin el parche ESXi600-201703403-SG, 6.0 U1 sin el parche ESXi600-201703402-SG, y 5.5 sin el parche ESXi550-20-20170140; Workstation Pro / Player versi\u00f3n 12.x anterior de 12.5.5; y Fusion Pro / Fusion versiones 8.x anterior a 8.5.6 de VMware, presenta un uso de memoria de la pila no inicializada en SVGA. Este problema puede permitir a un invitado ejecutar c\u00f3digo en el host." } ], "id": "CVE-2017-4903", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-07T18:29:00.350", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97160" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2017-0006.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-04 14:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/105881 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1042054 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1042055 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0027.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105881 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1042054 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1042055 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0027.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | workstation | 15.0.0 | |
vmware | fusion | * | |
vmware | fusion | 11.0.0 | |
apple | mac_os_x | - | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DA75D1C-1171-417D-9B05-CDFC693228FE", "versionEndExcluding": "14.1.4", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:15.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5CE7651-F5D0-449A-9BDB-E524153297F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7FA4899-D45D-407A-A8EC-C4247088FDC0", "versionEndExcluding": "10.1.4", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC3F6D23-B5D3-457E-BDB8-A08407F5896C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*", "matchCriteriaId": "0BC70488-A435-43BE-AEF4-30CBA36CBC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware ESXi 6.7 sin ESXi670-201811401-BG y VMware ESXi 6.5 sin ESXi650-201811301-BG, VMware ESXi 6.0 sin ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation en versiones 14.1.3 o anteriores, VMware Fusion 11 y VMware Fusion en versiones 10.1.3 o anteriores contiene un uso de memoria de la pila no inicializada en el adaptador de red virtual vmxnet3, lo que podr\u00eda permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2018-6981", "lastModified": "2024-11-21T04:11:31.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T14:29:00.543", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105881" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042054" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042055" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0027.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-908" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-12-29 09:59
Modified
2025-04-12 10:46
Severity ?
Summary
The drag-and-drop (aka DnD) function in VMware Workstation Pro 12.x before 12.5.2 and VMware Workstation Player 12.x before 12.5.2 and VMware Fusion and Fusion Pro 8.x before 8.5.2 allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (out-of-bounds memory access on the host OS) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/94280 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1037282 | ||
security@vmware.com | http://www.vmware.com/security/advisories/VMSA-2016-0019.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94280 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037282 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2016-0019.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | 8.0.0 | |
vmware | fusion | 8.0.1 | |
vmware | fusion | 8.0.2 | |
vmware | fusion | 8.1.0 | |
vmware | fusion | 8.1.1 | |
vmware | fusion | 8.5.0 | |
vmware | fusion | 8.5.1 | |
vmware | fusion_pro | 8.0.0 | |
vmware | fusion_pro | 8.0.1 | |
vmware | fusion_pro | 8.0.2 | |
vmware | fusion_pro | 8.1.0 | |
vmware | fusion_pro | 8.1.1 | |
vmware | fusion_pro | 8.5.0 | |
vmware | fusion_pro | 8.5.1 | |
vmware | workstation_player | 12.0.0 | |
vmware | workstation_player | 12.0.1 | |
vmware | workstation_player | 12.1.0 | |
vmware | workstation_player | 12.1.1 | |
vmware | workstation_player | 12.5.0 | |
vmware | workstation_player | 12.5.1 | |
vmware | workstation_pro | 12.0.0 | |
vmware | workstation_pro | 12.0.1 | |
vmware | workstation_pro | 12.1.0 | |
vmware | workstation_pro | 12.1.1 | |
vmware | workstation_pro | 12.5.0 | |
vmware | workstation_pro | 12.5.1 | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "25BBD4C7-C851-4D40-B6DD-92873319CD28", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDD345B3-810C-41D1-82CE-0CA0B4B1F5DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "768A4D3B-CC19-4A3A-91D5-9C974F7F0247", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5D443-A330-40DF-939B-10597147CE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5E09EA3-24E4-43A2-8AE7-6844A6F8F73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F62099A3-2331-4F1E-A994-D3CCE2B7171C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "12BA4C61-5604-4354-BD84-CE275EFA8442", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C90A36A-1FA7-45BB-937E-F7A5FD0914A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C384CC3F-EC56-4AA5-835B-ECCCDE2EC17E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "20A7D995-BB46-4464-9E82-D836EDE72DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion_pro:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEB7D35F-6BF1-4076-ABA3-B580CE69D922", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8ABE47D4-506C-4132-829B-19A61ED35F4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "67CDB0AC-25B6-4397-9784-386C81C37352", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C48608C8-B7A6-47DD-8C78-44EB2B0D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1787E49C-19A5-428D-9BEA-5500B3DD60F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E1D4E53-DEB3-4143-B619-4431DB47341F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C83B3D50-43FF-4034-9C75-F44939D60378", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3E8337D-BC36-4910-A998-309D277D008C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E91FE31-B442-4EE3-A415-D635A5CCA6C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C67B92FB-CE89-479D-97DF-237C77BF307B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F44F5FBF-DD1D-41F8-A1EC-9720DBC89008", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8A83855-1411-4CA8-A005-5AA58D1CB32A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3516D484-83AF-470E-9E9A-AFE3BBE4F75D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The drag-and-drop (aka DnD) function in VMware Workstation Pro 12.x before 12.5.2 and VMware Workstation Player 12.x before 12.5.2 and VMware Fusion and Fusion Pro 8.x before 8.5.2 allows guest OS users to execute arbitrary code on the host OS or cause a denial of service (out-of-bounds memory access on the host OS) via unspecified vectors." }, { "lang": "es", "value": "La funci\u00f3n de arrastrar y soltar (tambi\u00e9n conocida como DnD) en VMware Workstation Pro 12.x en versiones anteriores a 12.5.2 y VMware Workstation Player 12.x en versiones anteriores a 12.5.2 y VMware Fusion y Fusion Pro 8.x en versiones anteriores a 8.5.2 permite a usuarios invitados de SO ejecutar c\u00f3digo arbitrario en el SO anfitri\u00f3n o provocar una denegaci\u00f3n de servicio (acceso a memoria fuera de l\u00edmites en el SO anfitri\u00f3n) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-7461", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-29T09:59:00.697", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94280" }, { "source": "security@vmware.com", "url": "http://www.securitytracker.com/id/1037282" }, { "source": "security@vmware.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0019.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2013-0002.html | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2013-0002.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 8.0 | |
vmware | workstation | 8.0.0.18997 | |
vmware | workstation | 8.0.1 | |
vmware | workstation | 8.0.1.27038 | |
vmware | workstation | 8.0.2 | |
vmware | workstation | 8.0.3 | |
vmware | workstation | 8.0.4 | |
vmware | workstation | 9.0 | |
microsoft | windows | * | |
vmware | fusion | 4.1 | |
vmware | fusion | 4.1.1 | |
vmware | fusion | 4.1.2 | |
vmware | fusion | 4.1.3 | |
vmware | fusion | 5.0 | |
vmware | fusion | 5.0.1 | |
vmware | view | 4.0.0 | |
vmware | view | 4.0.0 | |
vmware | view | 4.5 | |
vmware | view | 4.6.0 | |
vmware | view | 4.6.1 | |
vmware | view | 5.0 | |
vmware | view | 5.0.0 | |
vmware | view | 5.0.0 | |
vmware | view | 5.0.1 | |
vmware | view | 5.1.0 | |
vmware | view | 5.1.1 | |
microsoft | windows | * | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 4.1 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.1 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "matchCriteriaId": "01483038-BC89-44BA-B07B-362FC5D7E8C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "matchCriteriaId": "B671AC17-7064-4541-ADB3-FCD72109C766", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "21644868-F1B0-4A8E-BE73-4F42BEB8E834", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4944D9B1-A48B-4F32-951E-BEC3FEAC45FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B439F706-27F8-4238-9396-B460EB78B6DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F74559CB-6E52-421F-88F3-739913C26C8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4870DAA2-6670-47EF-BF74-6E39B92E75DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "70C64B80-4928-4ABA-AF4E-1977C252BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8C8358B-4543-431C-B894-BD2CA04AD97C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EEF165A-4E09-4FF0-A577-FF429BCCF588", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDC22BC2-DC74-4322-929C-7F82C083C1C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:view:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7952E0E-6986-48BF-865C-189033AEB91E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:4.0.0:u2:*:*:*:*:*:*", "matchCriteriaId": "9D0C4BA2-E018-4C74-B259-E0CE3109A864", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4DE652F1-BC10-497D-A244-D893A148483D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "4346ED63-851E-43E9-933D-7CCAFA43B17B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7373CD57-520C-46D9-9728-28E976AA87FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "08133352-C2AE-4656-8A41-2D054F8DC820", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0B8E256-7371-4702-96AC-3A72A364D88A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:5.0.0:u2:*:*:*:*:*:*", "matchCriteriaId": "B6E0DE85-7C49-4446-9407-1778F438806B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F21D6157-BB2F-4D13-871C-654287765ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "45F2841C-51B4-49EA-B6F6-8C67525233A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:view:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F1A41C1B-AD58-42DD-8975-3CD6F0A34C15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Virtual Machine Communication Interface (VMCI) implementation in vmci.sys in VMware Workstation 8.x before 8.0.5 and 9.x before 9.0.1 on Windows, VMware Fusion 4.1 before 4.1.4 and 5.0 before 5.0.2, VMware View 4.x before 4.6.2 and 5.x before 5.1.2 on Windows, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 does not properly restrict memory allocation by control code, which allows local users to gain privileges via unspecified vectors." }, { "lang": "es", "value": "La implementaci\u00f3n en vmci.sys en el Virtual Machine Communication Interface (VMCI) en VMware Workstation v8.x anterior a v8.0.5 y v9.x anterior a v9.0.1 para Windows, VMware Fusion v4.1 anterior a v4.1.4 y 5.0 anterior a v5.0.2, VMware View v4.x anterior a v4.6.2 y v5.x anterior a v5.1.2 para Windows, VMware ESXi v4.0 a la v5.1, y VMware ESX v4.0 y v4.1, no restringe adecuadamente la asignaci\u00f3n de memoria por control c\u00f3digo, lo que permite a usuarios locales elevar sus privilegios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1406", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-11T22:55:01.413", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0002.html" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2013-0002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-02 15:29
Modified
2024-11-21 04:45
Severity ?
Summary
VMware Workstation (14.x before 14.1.6) and Fusion (10.x before 10.1.6) contain an out-of-bounds write vulnerability in the e1000 virtual network adapter. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securityfocus.com/bid/107635 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107635 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D7A2CFA-E5C0-49F9-8E60-0965AEBE364D", "versionEndExcluding": "14.1.6", "versionStartIncluding": "14.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.6) and Fusion (10.x before 10.1.6) contain an out-of-bounds write vulnerability in the e1000 virtual network adapter. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware Workstation (en las versiones 14.x anteriores a la 14.1.6) y Fusion (en las versiones 10.x anteriores a la 10.1.6) contienen una vulnerabilidad de escritura fuera de l\u00edmites en el adaptador de red virtual e1000. Este problema puede permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2019-5524", "lastModified": "2024-11-21T04:45:06.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-02T15:29:00.603", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107635" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-09 20:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6966 and CVE-2018-6967.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/104709 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041208 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0016.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104709 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041208 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0016.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CD4990A-14DD-414B-8946-680D7BF5D29E", "versionEndExcluding": "14.1.2", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C4E179-64D8-44F4-A60E-2C67268669C1", "versionEndExcluding": "10.1.2", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain an out-of-bounds read vulnerability in the shader translator. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs, a different vulnerability than CVE-2018-6966 and CVE-2018-6967." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-201806401-BG), Workstation (versiones 14.x anteriores a la 14.1.2) y Fusion (versiones 10.x, anteriores a la 10.1.2) contienen una vulnerabilidad de lectura fuera de l\u00edmites en el traductor del shader. Si este error se explota de manera exitosa, podr\u00eda dar lugar a una divulgaci\u00f3n de informaci\u00f3n o podr\u00eda permitir que atacantes con privilegios de usuario normal provoquen el cierre inesperado de sus m\u00e1quinas virtuales. Esta vulnerabilidad es diferente de CVE-2018-6966 y CVE-2018-6967." } ], "id": "CVE-2018-6965", "lastModified": "2024-11-21T04:11:29.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-09T20:29:01.003", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104709" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041208" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0016.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-06-13 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/75092 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032529 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032530 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75092 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032529 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2015-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | horizon_client | 3.2.0 | |
vmware | horizon_client | 3.3 | |
vmware | horizon_view_client | 5.4 | |
vmware | horizon_view_client | 5.4.1 | |
microsoft | windows | * | |
vmware | fusion | 6.0 | |
vmware | fusion | 6.0.1 | |
vmware | fusion | 6.0.2 | |
vmware | fusion | 6.0.3 | |
vmware | fusion | 6.0.4 | |
vmware | fusion | 6.0.5 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.0.1 | |
vmware | player | 6.0 | |
vmware | player | 6.0.1 | |
vmware | player | 6.0.2 | |
vmware | player | 6.0.3 | |
vmware | player | 6.0.4 | |
vmware | player | 6.0.5 | |
vmware | player | 7.0 | |
vmware | player | 7.1 | |
vmware | workstation | 10.0 | |
vmware | workstation | 10.0.1 | |
vmware | workstation | 10.0.2 | |
vmware | workstation | 10.0.3 | |
vmware | workstation | 10.0.4 | |
vmware | workstation | 10.0.5 | |
vmware | workstation | 11.0 | |
vmware | workstation | 11.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C7BA06B-60FB-456B-A4BF-401F82E88BBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3F0EB9C-6734-4A8E-84FA-E618B2FC5942", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "E82AFF09-F9F6-486B-9299-3852EBD9B333", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9391EA21-2A10-445A-B88A-103025C9A343", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA730B34-3F72-451D-9960-DF44821A001C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "67198AB1-95B1-4ECC-A4CE-E2EAE688E193", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "85A09E65-9C4C-42FD-A1B0-E925A905875A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7EF002E-10E1-4405-8C55-BD91AD45B891", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "82AE914B-8688-4274-9D40-C3A166F112AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "043541FC-C4F9-4E71-8373-E9022DCC62DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "200179EA-B682-435D-948C-5B70B686D1AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "1D5D0FC7-8389-4B1D-BDBD-3017E5740F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "93872771-BD86-4707-926B-F6C3577C33A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8903-B853-43A2-88C3-D79BBA70F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2275C-913F-43D9-8146-0B0CD737E485", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "01512B1C-ABCF-4705-91E8-F51FE6397343", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A74B9F8A-E336-4421-ADA8-D2640DD7E67E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71B0563B-F300-448D-8450-9B7B862F4560", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "492D7AD2-D660-48F5-A9BE-28CCA6A6B658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "90F0250C-EE18-486B-90D7-348FEF01C2D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2339." }, { "lang": "es", "value": "TPview.dll en VMware Workstation 10.x anterior a 10.0.6 y 11.x anterior a 11.1.1, VMware Player 6.x anterior a 6.0.6 y 7.x anterior a 7.1.1, y VMware Horizon Client 3.2.x anterior a 3.2.1, 3.3.x, y 5.x local-mode anterior a 5.4.2 en Windows no reserva correctamente memoria, lo que permite a usuarios del sistema operativo invitado causar una denegaci\u00f3n de servicio del sistema operativo anfitri\u00f3n a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-2339." } ], "id": "CVE-2015-2338", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-13T14:59:01.887", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75092" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2015-0004.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-12 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
cve@mitre.org | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/63607 | ||
cve@mitre.org | http://secunia.com/advisories/39203 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39206 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/39215 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/39395 | ||
cve@mitre.org | http://www.securitytracker.com/id?1023836 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2010/000090.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/63607 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39203 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39206 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39215 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/39395 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023836 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2010-0007.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.0 | |
vmware | workstation | 6.5.0 | |
vmware | workstation | 6.5.1 | |
vmware | workstation | 6.5.2 | |
vmware | workstation | 6.5.3 | |
microsoft | windows | * | |
vmware | player | 3.0 | |
vmware | player | 2.5 | |
vmware | player | 2.5.1 | |
vmware | player | 2.5.2 | |
vmware | player | 2.5.3 | |
microsoft | windows | * | |
vmware | ace | 2.5.0 | |
vmware | ace | 2.5.1 | |
vmware | ace | 2.5.2 | |
vmware | ace | 2.5.3 | |
vmware | ace | 2.6 | |
vmware | server | 2.0.0 | |
vmware | server | 2.0.1 | |
vmware | server | 2.0.2 | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | fusion | 2.0.3 | |
vmware | fusion | 2.0.4 | |
vmware | fusion | 2.0.5 | |
vmware | fusion | 2.0.6 | |
vmware | fusion | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F747AC1-E163-41A4-BAC7-FDF46F4057D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5674C3DD-F510-4701-ACA8-437576307528", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E62960B2-91AE-4DD7-8085-9BA6BCB84473", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBCA2A03-0A31-4290-987A-BE715758BA95", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "E87681DB-CBD8-46A6-BD9A-FB621B627B0E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A6C47EB8-8844-4D49-9246-008F7AE45C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "26B7268F-A170-4366-9196-E73A956883DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process." }, { "lang": "es", "value": "La pila de la red virtual en VMware Workstation v7.0 anteriores a v7.0.1 build 227600, VMware Workstation v6.5.x anteriores a v6.5.4 build 246459 en Windows, VMware Player v3.0 anteriores a v3.0.1 build 227600, VMware Player v2.5.x anteriores a v2.5.4 build 246459 en Windows, VMware ACE v2.6 anteriores a v2.6.1 build 227600 y v2.5.x anteriores a v2.5.4 build 246459, VMware Server v2.x, y VMware Fusion v3.0 anteriores a v3.0.1 build 232708 y v2.x anteriores a v2.0.7 build 246742 permite a atacantes remotos obtener informaci\u00f3n sensible de la memoria en el sistema operativo anfitri\u00f3n mediante el examen de los paquetes de red recibidos, relacionado con la interacci\u00f3n entre el sistema operativo invitado y el proceso vmware-vx anfitri\u00f3n." } ], "id": "CVE-2010-1138", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-12T18:30:00.553", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/63607" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39203" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39215" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/39395" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1023836" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/63607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1023836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-15 19:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/103431 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1040539 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0008.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103431 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040539 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0008.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation_pro | * | |
vmware | workstation_pro | 12.0 | |
vmware | workstation_pro | 12.1 | |
vmware | workstation_pro | 12.01 | |
vmware | workstation_pro | 12.1.1 | |
vmware | workstation_pro | 12.5 | |
vmware | workstation_pro | 12.5.1 | |
vmware | workstation_pro | 12.5.2 | |
vmware | workstation_pro | 12.5.3 | |
vmware | workstation_pro | 12.5.4 | |
vmware | workstation_pro | 12.5.5 | |
vmware | workstation_pro | 12.5.6 | |
vmware | workstation_pro | 12.5.7 | |
vmware | workstation_player | * | |
vmware | workstation_player | 12.0 | |
vmware | workstation_player | 12.0.1 | |
vmware | workstation_player | 12.1 | |
vmware | workstation_player | 12.1.1 | |
vmware | workstation_player | 12.5 | |
vmware | workstation_player | 12.5.1 | |
vmware | workstation_player | 12.5.2 | |
vmware | workstation_player | 12.5.3 | |
vmware | workstation_player | 12.5.4 | |
vmware | workstation_player | 12.5.5 | |
vmware | workstation_player | 12.5.6 | |
vmware | workstation_player | 12.5.7 | |
vmware | fusion | 8.0 | |
vmware | fusion | 8.0.1 | |
vmware | fusion | 8.0.2 | |
vmware | fusion | 8.1 | |
vmware | fusion | 8.1.1 | |
vmware | fusion | 8.5 | |
vmware | fusion | 8.5.1 | |
vmware | fusion | 8.5.2 | |
vmware | fusion | 8.5.3 | |
vmware | fusion | 8.5.4 | |
vmware | fusion | 8.5.5 | |
vmware | fusion | 8.5.6 | |
vmware | fusion | 8.5.7 | |
vmware | fusion | 8.5.8 | |
vmware | fusion | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "01DDAE03-7486-4F2E-99CD-CD400CB0F72F", "versionEndExcluding": "14.1.1", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "14CAB08C-37EE-40F9-B4C7-9DD5FD6DFDFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "00F69EAD-F5CD-43C9-921A-7AD78C362EDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.01:*:*:*:*:*:*:*", "matchCriteriaId": "EA738637-C31F-487F-B2E5-2B03AE9BE89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F44F5FBF-DD1D-41F8-A1EC-9720DBC89008", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "9BDBF213-94A3-4C13-B17F-3903B6C6D7DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3516D484-83AF-470E-9E9A-AFE3BBE4F75D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "2F5A845C-E2CA-4C3A-8019-22C7DC2EA6DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "8BB1B255-E6CD-439D-A871-81D8D1A1757E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "8000ABCB-2017-41AB-9C94-BF183A840F0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B53C77FA-7370-4773-9BFE-439514EE5A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "A905AAA0-B3CE-47B4-A3C4-13DAC53B8DDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_pro:12.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "044BF7CD-E0C7-4FFA-B5BB-0907CD65E353", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "119D5B47-E905-4AE2-B423-4096142E2DCF", "versionEndExcluding": "14.1.1", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6BFE98E-486A-4ABC-B5A3-264459900387", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "67CDB0AC-25B6-4397-9784-386C81C37352", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD0DB274-B645-445C-9558-4F42FEAACF0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1787E49C-19A5-428D-9BEA-5500B3DD60F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5:*:*:*:*:*:*:*", "matchCriteriaId": "BCB2C59D-2F2E-4D2D-B552-8425FB795687", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C83B3D50-43FF-4034-9C75-F44939D60378", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1613CB4-1088-40F1-A5E8-584284A980D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "4668751B-92FD-46ED-A19D-7853F30FC5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B166B022-46C1-4C4A-8428-7489F1D34A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "E46DF6A3-E8DE-4EDF-872E-2BD44235C91C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "07F861F9-E59D-4A25-8AC2-8C8C9FE11FB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation_player:12.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "7358D7A7-72E2-4A77-B15A-CB80D8DE945D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "61B23099-25EB-44B6-A62B-2E46CD151994", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55F26BA-4AFA-419A-BB0E-5C369F58F126", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "B34B944F-073D-4B52-8B92-0620603885DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0C5D443-A330-40DF-939B-10597147CE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "42BF8A2A-295D-44D6-A38E-D4C35437F380", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "DC08D3D5-5D46-45C7-BD43-81E1D18FAB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "574DB25B-51E1-466A-8089-5108DB5D6FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0BF7F09F-D8B3-40AF-9111-E7C14832C5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "555DD10F-7EA8-4107-A31F-2C7CED41058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "7EE4888B-156C-48BC-8035-3A0424CB6037", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:8.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "6D4DA202-3D18-4DDC-89E4-81FFF68EDFD0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7419FA0-119C-4C1C-A071-90A9F8ECDB32", "versionEndExcluding": "10.1.1", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled." }, { "lang": "es", "value": "VMware Workstation (versiones 14.x anteriores a la 14.1.1 y 12.x) y Fusion (10.x anteriores a la 10.1.1 y 8.x) contiene una vulnerabilidad de denegaci\u00f3n de servicio (DoS) que se puede desencadenar al abrir un n\u00famero excesivo de sesiones VNC. Nota: Para que su explotaci\u00f3n sea posible en Workstation y Fusion, se debe habilitar VNC manualmente." } ], "id": "CVE-2018-6957", "lastModified": "2024-11-21T04:11:28.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-15T19:29:01.343", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103431" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040539" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0008.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-16 19:29
Modified
2024-11-21 04:11
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/105660 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041875 | Broken Link, Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1041876 | Broken Link, Third Party Advisory, VDB Entry | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2018-0026.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105660 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041875 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041876 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2018-0026.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | * | |
vmware | fusion | * | |
apple | mac_os_x | - | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BABAFE4-F4FC-4EA6-837E-940E321B535C", "versionEndExcluding": "14.1.3", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "247C3211-1107-4E0A-8378-6BEF09F1BDB2", "versionEndExcluding": "10.1.3", "versionStartIncluding": "10.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*", "matchCriteriaId": "52403C80-3022-4E5B-B16A-24B116D1E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*", "matchCriteriaId": "FBECED2E-05FD-492E-8B57-9BB8ADA82444", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*", "matchCriteriaId": "3C3FBBA4-01FA-45B5-AEDF-FFFE941163FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*", "matchCriteriaId": "A63E3C72-3145-4661-BBCD-8A67EC0CDDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*", "matchCriteriaId": "9159F6E1-6A36-4D3C-85B1-2205B90CD244", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*", "matchCriteriaId": "C2C08C24-FBAC-49B8-AABF-4FF8BADA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "matchCriteriaId": "2B9D5E67-78C9-495E-91F0-AF94871E5FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "matchCriteriaId": "6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "matchCriteriaId": "ADC13026-3B5A-4BF0-BDEC-B77338E427E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "matchCriteriaId": "6CBA70BA-FFCD-4D2D-AD26-95CC62748937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "matchCriteriaId": "4C92DD8B-8AB8-40D4-8E86-12FEB055D37A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "matchCriteriaId": "C58D77F5-CDB2-47DA-A879-BABEBE2E1E04", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "matchCriteriaId": "D0C324FB-3989-4A4A-BF5B-C40CA698DDB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "matchCriteriaId": "0E7AC58E-D1F8-4FDF-9A28-61CF6158330A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "matchCriteriaId": "489EE0F6-5510-470E-8711-DC08B4AFB4F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "matchCriteriaId": "6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "matchCriteriaId": "DDAA48A9-9319-4104-B151-D529E5EBF0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "matchCriteriaId": "D16CD918-5075-4975-8B1E-21D8AD35A28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "matchCriteriaId": "7A38CD8E-494D-4E0E-A300-8550FC81FAE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "matchCriteriaId": "1F40ABE8-8DED-4633-A34C-00DF5D510E71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "matchCriteriaId": "1736B975-089B-413C-8CA0-5524B957EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "matchCriteriaId": "0E4DCBF6-7189-497A-B923-08574443172C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "matchCriteriaId": "16FBA646-0B5E-44A7-BB12-29D5C611AEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "matchCriteriaId": "29F57497-7B48-4D0C-B8F5-8D33062BECEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "matchCriteriaId": "ADDE96C7-C489-4D14-990B-8524627A23D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "matchCriteriaId": "AD82C093-FD98-45DE-9EE6-A05E81A1FEC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "matchCriteriaId": "08789F9E-CDC7-4F89-B925-92C9E3AE5234", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "matchCriteriaId": "26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "matchCriteriaId": "621C203B-4B66-49CC-A35D-D7703109BF14", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "matchCriteriaId": "3261BDEF-D89C-41D9-A360-EC36EAB17490", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "matchCriteriaId": "5170A4F6-02B7-4225-B944-73DB5A4D332C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "matchCriteriaId": "62A97DBA-A56B-4F0B-B9C4-44B5166681AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "matchCriteriaId": "806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "matchCriteriaId": "DBA6211E-134A-484E-8444-FBB5070B395D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "matchCriteriaId": "3E7B05B3-4076-4A44-B9A6-A44419F175C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "matchCriteriaId": "1A1636B4-6E79-42D7-AA62-5EE43412B43A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "matchCriteriaId": "0F0377D0-BBED-41BF-80C5-58414ED413EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "matchCriteriaId": "6495283C-D18A-4DDA-852E-46F2273D6DAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "matchCriteriaId": "09DEFEE5-5E9E-4F3A-A245-3E8E2B291339", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "matchCriteriaId": "4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "matchCriteriaId": "17A84E0A-1429-467F-9EE1-FCA062392DC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "matchCriteriaId": "C591163D-64BC-403B-A460-5B2258EC2F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "matchCriteriaId": "ED932B89-D34D-4398-8F79-AF98987CAFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "matchCriteriaId": "ABD365A0-0B09-4EC2-9973-691144C99507", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "matchCriteriaId": "FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "matchCriteriaId": "0E198AE4-A6A3-4875-A7DA-44BE9E1B280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "matchCriteriaId": "2FDD5BA0-8180-484D-8308-B0862B6E9DC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "matchCriteriaId": "96A6EB9A-A908-42D1-A6BC-E38E861BBECE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "matchCriteriaId": "651EDCAA-D785-464D-AE41-425A69F6FFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "matchCriteriaId": "1B3C704C-9D60-4F72-B482-07F209985E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "matchCriteriaId": "C1CFE956-4391-4B71-BD0B-96A008A624B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "matchCriteriaId": "409778CD-9AB3-4793-A5F5-8D8657F81442", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "matchCriteriaId": "F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "matchCriteriaId": "0DC45A8B-6DE0-465F-9644-B75A09394F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "matchCriteriaId": "7A265671-BCB0-401A-A1E8-500F9D41492E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "matchCriteriaId": "83168067-1E43-4186-9B15-3FC702C6583C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "matchCriteriaId": "8C122DB4-8410-4C4E-87BE-EB3175CE182B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "matchCriteriaId": "C76ED78D-0778-4269-938E-BB7586C1E44E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "matchCriteriaId": "7A1F78C5-E995-4E37-83C5-5B6A1D39E549", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "matchCriteriaId": "7A2E842D-AF37-4641-AD05-B91F250E7487", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "matchCriteriaId": "A07EAC87-32FD-4553-B71D-181F2C66AE68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "matchCriteriaId": "AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "matchCriteriaId": "865D3042-68ED-44B9-A036-9433F7463D6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "matchCriteriaId": "FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "matchCriteriaId": "11AE3F61-9655-4B20-96E1-92112BE2BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "matchCriteriaId": "ECE35166-3019-450B-9C69-484E4EDE5A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "matchCriteriaId": "D892B066-381B-4F46-8363-7BA1647BBCD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "matchCriteriaId": "710DB381-5504-4493-8D0A-17AB8E5A903B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "matchCriteriaId": "42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "matchCriteriaId": "33CBCA55-010E-4E84-B2F8-F9B53D5A3340", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "matchCriteriaId": "95A73B4B-F9B3-4D66-9668-902902C73CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "matchCriteriaId": "8D14D51D-E2EA-4826-8C6E-AF1C15F12384", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "matchCriteriaId": "BED100A1-9D59-48BE-91D4-0C8F2D678E6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "matchCriteriaId": "660B51F2-DFE0-49F6-AD2A-6E94B20F4019", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "matchCriteriaId": "8BF80536-348A-468E-AC1C-DA53632FCC83", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "matchCriteriaId": "CFABF302-AC32-4507-BDD9-314854DE55BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "matchCriteriaId": "9EDE020F-4FB1-4F1D-B434-6745045702D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "matchCriteriaId": "AA1538B9-E860-46CE-A4CA-1393ECA20D30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "matchCriteriaId": "386A6805-6167-47BA-A02F-073DC7E0FE36", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "matchCriteriaId": "03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "matchCriteriaId": "1CFCFE7B-37E5-4C64-9B43-4F693F227231", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "matchCriteriaId": "02CFAE22-37DB-4787-96FB-9E0F8EF671E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*", "matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-201810101-SG, versiones 6.5 anteriores a ESXi650-201808401-BG, y versiones 6.0 anteriores a ESXi600-201808401-BG), Workstation (versiones 14.x anteriores a la 14.1.3) y Fusion (versiones 10.x anteriores a la 10.1.3) contienen una vulnerabilidad de lectura fuera de l\u00edmites en el dispositivo SVGA. Este problema podr\u00eda permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2018-6974", "lastModified": "2024-11-21T04:11:30.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-16T19:29:00.710", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105660" }, { "source": "security@vmware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041875" }, { "source": "security@vmware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041876" }, { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0026.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-01 21:30
Modified
2024-11-21 04:45
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain an out-of-bounds read/write vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securityfocus.com/bid/107541 | ||
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-19-421/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107541 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0005.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-19-421/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | workstation | * | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.0 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEBF6D2-4832-46F0-A0B1-4B47FDCFD6BE", "versionEndExcluding": "10.1.6", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1D88E61-CE5C-467A-A720-F4DCFC248134", "versionEndExcluding": "11.0.3", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B11AFA-BA40-40C7-9F8E-6CB1A7DAE369", "versionEndExcluding": "14.1.7", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0F08B22-5048-4A6C-9250-6A3593A4570F", "versionEndExcluding": "15.0.4", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "3E8861F4-D390-4738-BBF0-9EE4684E9667", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*", "matchCriteriaId": "0BC70488-A435-43BE-AEF4-30CBA36CBC03", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*", "matchCriteriaId": "2B37DC7D-A1C6-468F-A42E-160CE226FF7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain an out-of-bounds read/write vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware ESXi (en las versiones 6.7 anteriores a la ESXi670-201903001, en las 6.5 anteriores a la ESXi650-201903001 y en las 6.0 anteriores a la ESXi600-201903001), Workstation (en las versiones 15.x anteriores a la 15.0.4 y en las 14.x anteriores a la 14.1.7), Fusion (en las versiones 11.x anteriores a la 11.0.3 y en las 10.x anteriores a la 10.1.6) contiene una vulnerabilidad de lectura/escritura fuera de l\u00edmites en la UHCI virtual (Universal Host Controller Interface) de USB 1.1. La explotaci\u00f3n de este fallo requiere que el atacante tenga acceso a una m\u00e1quina virtual con un controlador USB virtual presente. Este problema puede permitir que un invitado ejecute c\u00f3digo en el host" } ], "id": "CVE-2019-5518", "lastModified": "2024-11-21T04:45:05.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-01T21:30:43.953", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "security@vmware.com", "url": "http://www.securityfocus.com/bid/107541" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "security@vmware.com", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-421/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/107541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-421/" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-20 09:15
Modified
2024-11-21 08:06
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds
read vulnerability that exists in the functionality for sharing host
Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual
machine may be able to read privileged information contained in
hypervisor memory from a virtual machine.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "118254F1-8F14-4573-B3A4-56EE365A41ED", "versionEndExcluding": "17.5", "versionStartIncluding": "17.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F574C812-1E1F-4991-9442-74E799DACAD8", "versionEndExcluding": "13.5", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds \nread vulnerability that exists in the functionality for sharing host \nBluetooth devices with the virtual machine.\u00a0A malicious actor with local administrative privileges on a virtual \nmachine may be able to read privileged information contained in \nhypervisor memory from a virtual machine." }, { "lang": "es", "value": "VMware Workstation (17.x anterior a 17.5) y Fusion (13.x anterior a 13.5) contienen una vulnerabilidad de lectura fuera de l\u00edmites que existe en la funcionalidad para compartir dispositivos Bluetooth host con la m\u00e1quina virtual. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede leer informaci\u00f3n privilegiada contenida en la memoria del hipervisor desde una m\u00e1quina virtual." } ], "id": "CVE-2023-34044", "lastModified": "2024-11-21T08:06:27.847", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-20T09:15:12.600", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-03 10:15
Modified
2024-09-17 13:33
Severity ?
8.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable. A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF374027-E370-4C67-B45F-A35C8DE3A545", "versionEndExcluding": "13.6", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable.\u00a0A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application." }, { "lang": "es", "value": "VMware Fusion (13.x anterior a 13.6) contiene una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo debido al uso de una variable de entorno insegura. Un actor malintencionado con privilegios de usuario est\u00e1ndar puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la aplicaci\u00f3n Fusion." } ], "id": "CVE-2024-38811", "lastModified": "2024-09-17T13:33:32.957", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-03T10:15:05.477", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24939" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security@vmware.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-29 20:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine's vmx process leading to a partial denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EE7A5C1-9A67-410D-9A04-FAEFA1D1DB1B", "versionEndExcluding": "11.1.0", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A748C-18BC-4EA0-B599-CFAE4E36B00B", "versionEndExcluding": "15.1.0", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*", "matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*", "matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*", "matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*", "matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*", "matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*", "matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*", "matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*", "matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*", "matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*", "matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*", "matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*", "matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*", "matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*", "matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*", "matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*", "matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), VMware Workstation (15.x before 15.1.0) and VMware Fusion (11.x before 11.1.0) contain a memory leak vulnerability in the VMCI module. A malicious actor with local non-administrative access to a virtual machine may be able to crash the virtual machine\u0027s vmx process leading to a partial denial of service." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-202004101-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), VMware Workstation (versiones 15.x anteriores a 15.1.0) y VMware Fusion (versiones 11.x anteriores a 11.1.0), contienen una vulnerabilidad de fuga de la memoria en el m\u00f3dulo VMCI. Un agente malicioso con acceso no administrativo local a una m\u00e1quina virtual puede ser capaz de bloquear el proceso vmx de la m\u00e1quina virtual, conllevando a una denegaci\u00f3n de servicio parcial." } ], "id": "CVE-2020-3959", "lastModified": "2024-11-21T05:32:02.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-29T20:15:11.687", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0011.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-04 12:15
Modified
2025-03-05 16:22
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | esxi | 8.0 | |
vmware | cloud_foundation | - | |
vmware | fusion | * | |
vmware | telco_cloud_infrastructure | 2.2 | |
vmware | telco_cloud_infrastructure | 2.5 | |
vmware | telco_cloud_infrastructure | 2.7 | |
vmware | telco_cloud_infrastructure | 3.0 | |
vmware | telco_cloud_platform | 2.0 | |
vmware | telco_cloud_platform | 2.5 | |
vmware | telco_cloud_platform | 2.7 | |
vmware | telco_cloud_platform | 3.0 | |
vmware | telco_cloud_platform | 4.0 | |
vmware | telco_cloud_platform | 4.0.1 | |
vmware | telco_cloud_platform | 5.0 | |
vmware | workstation | * |
{ "cisaActionDue": "2025-03-25", "cisaExploitAdd": "2025-03-04", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*", "matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*", "matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*", "matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*", "matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*", "matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*", "matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*", "matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*", "matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*", "matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*", "matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*", "matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*", "matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*", "matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*", "matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*", "matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*", "matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*", "matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*", "matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*", "matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*", "matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*", "matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*", "matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*", "matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*", "matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*", "matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F76F8A7-6184-4A39-9FA5-2337CC9D4CB1", "versionEndExcluding": "13.6.3", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "3124246D-3287-4657-B40D-E7B80A44E7D7", "versionEndExcluding": "17.6.3", "versionStartIncluding": "17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain\u00a0an information disclosure vulnerability due to an out-of-bounds read in HGFS.\u00a0A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process." }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido a una lectura fuera de los l\u00edmites en HGFS. Un actor malintencionado con privilegios administrativos en una m\u00e1quina virtual podr\u00eda aprovechar este problema para filtrar memoria del proceso vmx." } ], "id": "CVE-2025-22226", "lastModified": "2025-03-05T16:22:52.433", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "security@vmware.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-04T12:15:33.973", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-15 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | http://www.securityfocus.com/bid/100843 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1039365 | Third Party Advisory, VDB Entry | |
security@vmware.com | http://www.securitytracker.com/id/1039366 | Third Party Advisory, VDB Entry | |
security@vmware.com | https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html | Exploit, Third Party Advisory | |
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2017-0015.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100843 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039365 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039366 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2017-0015.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "92BB0EFB-2FDE-4C23-81D6-A706C380F83C", "versionEndExcluding": "8.5.8", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5298092-7D33-4BB6-954E-4DECA2C554EB", "versionEndExcluding": "12.5.7", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host." }, { "lang": "es", "value": "VMware ESXi (ESXi 6.5 sin el parche ESXi650-201707101-SG), Workstation (en versiones 12.x anteriores a la 12.5.7) y Fusion (en versiones 8.x anteriores a la 8.5.8) contienen una vulnerabilidad de escritura fuera de l\u00edmites en un dispositivo SVGA. Este problema podr\u00eda permitir que un invitado ejecute c\u00f3digo en el host." } ], "id": "CVE-2017-4924", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-15T13:29:00.197", "references": [ { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100843" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039365" }, { "source": "security@vmware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039366" }, { "source": "security@vmware.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html" }, { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2017-0015.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-25 15:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "73EF8C75-E92C-440B-A7C9-5E2E4C6A36F9", "versionEndExcluding": "3.7.2", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DEC340C-6848-4ABC-8A3E-3E9B80F4B4EC", "versionEndExcluding": "11.0.2", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "00FC06EC-9846-491F-9FB6-B79C5276F90D", "versionEndExcluding": "15.0.2", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-201904101-SG y versiones 6.5 anteriores a ESXi650-201907101-SG), Workstation (versiones 15.x anteriores a 15.0.2) y Fusion (versiones 11.x anteriores a 11.0.2), contiene una vulnerabilidad de desbordamiento de la pila en el adaptador de red virtual vmxnet3. Un actor malicioso con acceso local a una m\u00e1quina virtual con un adaptador de red vmxnet3 presente puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria f\u00edsica" } ], "id": "CVE-2020-3971", "lastModified": "2024-11-21T05:32:05.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-25T15:15:11.507", "references": [ { "source": "security@vmware.com", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-01-09 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securitytracker.com/id/1034603 | ||
cve@mitre.org | http://www.securitytracker.com/id/1034604 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2016-0001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034603 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034604 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2016-0001.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | player | 7.0 | |
vmware | player | 7.1 | |
vmware | player | 7.1.1 | |
vmware | workstation | 11.0 | |
vmware | workstation | 11.1 | |
vmware | workstation | 11.1.1 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.0 | |
vmware | esxi | 5.1 | |
vmware | esxi | 5.1 | |
vmware | esxi | 5.5 | |
vmware | esxi | 6.0 | |
vmware | fusion | 7.0 | |
vmware | fusion | 7.1 | |
vmware | fusion | 7.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "93872771-BD86-4707-926B-F6C3577C33A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B52D8903-B853-43A2-88C3-D79BBA70F8CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "78016ED4-AEA7-4E54-8986-E997000CD646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "492D7AD2-D660-48F5-A9BE-28CCA6A6B658", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "90F0250C-EE18-486B-90D7-348FEF01C2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:11.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E33E15C-62ED-4E24-AB00-0632C8A90C6E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*", "matchCriteriaId": "9A405802-D786-46F9-9E29-C727F9FD480A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "469D98A5-7B8B-41BE-94C6-D6EF25388007", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC77ADEA-F0B8-4E5D-B965-39397F823075", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "92275180-52FC-48DE-947C-3AE1B87AF2C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9D5FE8B-7826-4690-952A-1FD98B7B9275", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2C9E4C16-838C-4302-A4E7-A79878070519", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The VMware Tools HGFS (aka Shared Folders) implementation in VMware Workstation 11.x before 11.1.2, VMware Player 7.x before 7.1.2, VMware Fusion 7.x before 7.1.2, and VMware ESXi 5.0 through 6.0 allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption) via unspecified vectors." }, { "lang": "es", "value": "La implementaci\u00f3n VMware Tools HGFS (tambi\u00e9n conocida como Shared Folders) en VMware Workstation 11.x en versiones anteriores a 11.1.2, VMware Player 7.x en versiones anteriores a 7.1.2, VMware Fusion 7.x en versiones anteriores a 7.1.2 y VMware ESXi 5.0 hasta la versi\u00f3n 6.0 permite a usuarios de SO invitado de Windows obtener privilegios de SO invitado o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria del kernel del SO invitado) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-6933", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-09T02:59:00.127", "references": [ { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1034603" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1034604" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2016-0001.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/44840 | ||
cve@mitre.org | http://secunia.com/advisories/44904 | ||
cve@mitre.org | http://www.securityfocus.com/bid/48098 | ||
cve@mitre.org | http://www.securitytracker.com/id?1025601 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2011-0009.html | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/67813 | ||
cve@mitre.org | https://hermes.opensuse.org/messages/8711677 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44840 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44904 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48098 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025601 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0009.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67813 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://hermes.opensuse.org/messages/8711677 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | workstation | 7.1.1 | |
vmware | workstation | 7.1.2 | |
vmware | workstation | 7.1.3 | |
vmware | player | 3.1 | |
vmware | player | 3.1.1 | |
vmware | player | 3.1.2 | |
vmware | player | 3.1.3 | |
vmware | fusion | 3.1 | |
vmware | fusion | 3.1.1 | |
vmware | fusion | 3.1.2 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esx | 4.1 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | esxi | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DAA72ED8-3229-4220-BE75-712CA6E21062", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "73C9E205-87EE-4CE2-A252-DED7BB6D4EAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors." }, { "lang": "es", "value": "mount.vmhgfs en Host Guest File System (HGFS) de VMware en VMware Workstation versiones 7.1.x anteriores a 7.1.4, VMware Player versiones 3.1.x anteriores a 3.1.4, VMware Fusion versiones 3.1.x anteriores a 3.1.3, VMware ESXi versiones 3.5 hasta 4.1, y VMware ESX versiones 3.0.3 hasta 4.1, permite a los usuarios del Sistema Operativo invitado determinar la existencia de archivos y directorios del sistema operativo host por medio de vectores no especificados." } ], "id": "CVE-2011-2146", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:02.863", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44840" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/44904" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/48098" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025601" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67813" }, { "source": "cve@mitre.org", "url": "https://hermes.opensuse.org/messages/8711677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://hermes.opensuse.org/messages/8711677" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-16 17:15
Modified
2024-11-21 05:49
Severity ?
Summary
VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | cloud_foundation | * | |
vmware | cloud_foundation | * | |
vmware | fusion | * | |
vmware | fusion | - | |
vmware | workstation | * | |
vmware | esxi | 6.5 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 6.7 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 | |
vmware | esxi | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "28769D3C-0C46-4E6B-A8E2-75A7B64B1D47", "versionEndExcluding": "3.11", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBED072F-DE79-41C6-AD4F-02E10BD27FBD", "versionEndExcluding": "4.4", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "6735BF82-477F-498C-90E6-A744DECEEB1E", "versionEndExcluding": "12.2.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9E82547-FA15-4A83-B920-23CE424D3715", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "E41B621D-14BE-4B48-B265-57BBC4ADEBF0", "versionEndExcluding": "16.2.1", "versionStartIncluding": "16.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202202401:*:*:*:*:*:*", "matchCriteriaId": "4C47BEFC-1434-4676-A123-359A500F19BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*", "matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*", "matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*", "matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*", "matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*", "matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*", "matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*", "matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*", "matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*", "matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*", "matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*", "matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*", "matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*", "matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*", "matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*", "matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*", "matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*", "matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*", "matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*", "matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*", "matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*", "matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*", "matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*", "matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*", "matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*", "matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*", "matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*", "matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*", "matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*", "matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*", "matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*", "matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*", "matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*", "matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*", "matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*", "matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*", "matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*", "matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*", "matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*", "matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*", "matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*", "matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*", "matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*", "matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*", "matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*", "matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*", "matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*", "matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*", "matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*", "matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*", "matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*", "matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*", "matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*", "matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*", "matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*", "matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*", "matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*", "matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*", "matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*", "matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*", "matchCriteriaId": "6431DD1F-2269-4AFB-B486-9B6373F41C57", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*", "matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*", "matchCriteriaId": "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*", "matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*", "matchCriteriaId": "A86BDAB4-3924-45A8-9130-517DEA184FA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*", "matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*", "matchCriteriaId": "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*", "matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*", "matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*", "matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*", "matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*", "matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*", "matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*", "matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*", "matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*", "matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*", "matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*", "matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*", "matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*", "matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*", "matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*", "matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*", "matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*", "matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*", "matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*", "matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*", "matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*", "matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*", "matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*", "matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*", "matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*", "matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*", "matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*", "matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201911001:*:*:*:*:*:*", "matchCriteriaId": "2130E67D-7F2A-4D82-BEFD-BA42B6B6FDA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*", "matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*", "matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*", "matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*", "matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*", "matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*", "matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*", "matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*", "matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*", "matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*", "matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*", "matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*", "matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*", "matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*", "matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*", "matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*", "matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*", "matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*", "matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*", "matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*", "matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*", "matchCriteriaId": "18E8632C-E442-4F18-BFE2-96AE5C839F0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202011001:*:*:*:*:*:*", "matchCriteriaId": "13D69B99-CB36-45DD-9FD9-C58186998200", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202011002:*:*:*:*:*:*", "matchCriteriaId": "EF0BC157-1834-46D8-9BF9-0CE9648C7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202102001:*:*:*:*:*:*", "matchCriteriaId": "728136B6-47A7-42BC-9464-7745E4F2B4FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202103001:*:*:*:*:*:*", "matchCriteriaId": "3967967A-E0A5-45B3-999C-D749A9B0C791", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202111101:*:*:*:*:*:*", "matchCriteriaId": "644588BB-2A6D-481C-9B2F-756C23B989DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host." }, { "lang": "es", "value": "VMware ESXi, Workstation y Fusion contienen una vulnerabilidad de doble b\u00fasqueda en el controlador USB UHCI. Un actor malicioso con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que es ejecutada en el host" } ], "id": "CVE-2021-22041", "lastModified": "2024-11-21T05:49:29.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-16T17:15:10.477", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-02 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2009/000069.html | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/37172 | Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
cve@mitre.org | http://securitytracker.com/id?1023082 | ||
cve@mitre.org | http://securitytracker.com/id?1023083 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/507523/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/507539/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/36841 | Exploit | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0015.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/3062 | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2009/000069.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37172 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023082 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023083 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507523/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507539/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36841 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0015.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3062 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | ace | 2.5.0 | |
vmware | ace | 2.5.1 | |
vmware | ace | 2.5.2 | |
vmware | esx | 2.5.5 | |
vmware | esx | 3.0.3 | |
vmware | esx | 3.5 | |
vmware | esx | 4.0 | |
vmware | esxi | 3.5 | |
vmware | esxi | 4.0 | |
vmware | fusion | 2.0 | |
vmware | fusion | 2.0.1 | |
vmware | fusion | 2.0.2 | |
vmware | fusion | 2.0.3 | |
vmware | fusion | 2.0.4 | |
vmware | fusion | 2.0.5 | |
vmware | player | 2.5 | |
vmware | player | 2.5.1 | |
vmware | player | 2.5.2 | |
vmware | server | 1.0 | |
vmware | server | 1.0.1 | |
vmware | server | 1.0.2 | |
vmware | server | 1.0.3 | |
vmware | server | 1.0.4 | |
vmware | server | 1.0.5 | |
vmware | server | 1.0.6 | |
vmware | server | 1.0.7 | |
vmware | server | 1.0.8 | |
vmware | server | 1.0.9 | |
vmware | server | 2.0 | |
vmware | server | 2.0 | |
vmware | server | 2.0.1 | |
vmware | workstation | 6.5.0 | |
vmware | workstation | 6.5.1 | |
vmware | workstation | 6.5.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5674C3DD-F510-4701-ACA8-437576307528", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E62960B2-91AE-4DD7-8085-9BA6BCB84473", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "B037838B-072E-4676-9E5D-86F5BC207512", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73EC33AB-E92A-4AA8-A523-C341133BB515", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53197903-0614-4460-8944-C1B5257D71A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F037B05F-6F92-4BE1-B672-F677CBEFD075", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD6D27-1335-44EF-8B69-A9163A67BC2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A6BFEAE8-0118-4548-A6EA-E90FA8FE7AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "42049891-38B7-4BB7-8DA5-A87169E2D958", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "07139DF7-C36B-4FED-8558-7FA49BE0BCFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E0D7307-5946-45DC-88D3-6BC72EF50184", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "89699BB6-9E41-41DC-B597-B45CA05313A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C9D09AC-7D9B-4150-86BC-19F44F6F2CA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2786E370-6108-4695-B0A8-9F19D8E3C0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "3C2AAA6D-A31D-43A7-AB2F-FBF9815A9745", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register." }, { "lang": "es", "value": "VMware Workstation v6.5.x anteriores a v6.5.3 build 185404, VMware Player v2.5.x anteriores a v2.5.3 build 185404, VMware ACE v2.5.x anteriores a v2.5.3 build 185404, VMware Server v1.x anteriores a v1.0.10 build 203137 and v2.x anteriores a v2.0.2 build 203138, VMware Fusion v2.x anteriores a v2.0.6 build 196839, VMware ESXi v3.5 y v4.0, y VMware ESX v2.5.5, v3.0.3, v3.5 y v4.0, cuando el modo Virtual-8086 es usado, no asigna adecuadamente el c\u00f3digo de excepci\u00f3n para una excepci\u00f3n de fallo de p\u00e1gina (tambi\u00e9n conocido como #PF), lo que permite a usuarios del SO anfitri\u00f3n obtener privilegios en el SO anfitri\u00f3n especificando un valor modificado para el registro cs." } ], "id": "CVE-2009-2267", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-11-02T15:30:00.420", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37172" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023082" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023083" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507523/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/507539/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/36841" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3062" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507523/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/507539/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/36841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-31 11:17
Modified
2025-04-12 10:46
Severity ?
Summary
VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html | ||
cve@mitre.org | http://secunia.com/advisories/58894 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/532236/100/0/threaded | ||
cve@mitre.org | http://www.securitytracker.com/id/1030310 | ||
cve@mitre.org | http://www.securitytracker.com/id/1030311 | ||
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2014-0005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58894 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/532236/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1030310 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1030311 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2014-0005.html |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4BF84FD-2666-48F4-AEA6-4F2B30AF95BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "184E7883-BBAD-4687-881A-69F0A5341ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2CFDBFB-3776-4615-AF3B-FCBD6840A95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDD49B-0083-4743-B4F8-6214FE8F4822", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEBFD3AF-D8A3-4599-AF42-B47C0A62AA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D0119B9-916C-4A98-8542-10FFC4F71C80", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CA413B-AB24-4884-A052-2A30A0CA4E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*", "matchCriteriaId": "9A405802-D786-46F9-9E29-C727F9FD480A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "469D98A5-7B8B-41BE-94C6-D6EF25388007", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Tools in VMware Workstation 10.x before 10.0.2, VMware Player 6.x before 6.0.2, VMware Fusion 6.x before 6.0.3, and VMware ESXi 5.0 through 5.5, when a Windows 8.1 guest OS is used, allows guest OS users to gain guest OS privileges or cause a denial of service (kernel NULL pointer dereference and guest OS crash) via unspecified vectors." }, { "lang": "es", "value": "VMware Tools en VMware Workstation 10.x anterior a 10.0.2, VMware Player 6.x anterior a 6.0.2, VMware Fusion 6.x anterior a 6.0.3 y VMware ESXi 5.0 hasta 5.5, cuando un sistema operativo invitado de Windows 8.1 est\u00e1 utilizado, permite a usuarios del sistema operativo invitado ganar privilegios del sistema operativo invitado o causar una denegaci\u00f3n de servicio (referencia a puntero nulo de kernel y ca\u00edda del sistema operativo invitado) a trav\u00e9s de vectores no especificados." } ], "evaluatorComment": "Per http://cwe.mitre.org/data/definitions/476.html\n\"CWE-476: NULL Pointer Dereference\"", "id": "CVE-2014-3793", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-31T11:17:13.560", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/58894" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/532236/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1030310" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1030311" }, { "source": "cve@mitre.org", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/126869/VMware-Security-Advisory-2014-0005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/532236/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0005.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-20 16:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process.
References
▶ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2019-0021.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2019-0021.html | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B332C2-587E-49DB-8346-7F87BBE2E44F", "versionEndExcluding": "15.5.1", "versionStartIncluding": "15.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "06D524E6-E4CA-47CE-BF68-0D33CB9391A4", "versionEndExcluding": "11.5.1", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware Workstation (15.x before 15.5.1) and Fusion (11.x before 11.5.1) contain an information disclosure vulnerability in vmnetdhcp. Successful exploitation of this issue may allow an attacker on a guest VM to disclose sensitive information by leaking memory from the host process." }, { "lang": "es", "value": "VMware Workstation (versiones 15.x anteriores a 15.5.1) y Fusion (versiones 11.x anteriores a 11.5.1), contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en vmnetdhcp. Una explotaci\u00f3n con \u00e9xito de este problema puede permitir a un atacante, en una m\u00e1quina virtual invitada, revelar informaci\u00f3n confidencial mediante la perdida de memoria del proceso del host." } ], "id": "CVE-2019-5540", "lastModified": "2024-11-21T04:45:09.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-20T16:15:12.997", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }