CVE-2005-4459
Published Dec 21, 2005
Last updated 6 years ago
Overview
- Description
- Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05CC5F49-0E9E-45D8-827D-A5940566DB25" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D94EE19-6CE9-4E02-8174-D9954CDBF02B" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4088851B-C42B-4B3C-B548-68A026C2BC96" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A1E0FF6-89A3-4530-A6B5-D9951C951209" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CE38F15-BD42-4171-8670-86AA8169A60C" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "944FE3AE-C500-4891-BC05-3F1E3417FF68" }, { "criteria": "cpe:2.3:a:vmware:gsx_server:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "111932A6-B0ED-4A79-A533-AEA984DB6A90" }, { "criteria": "cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E76D03A3-DB55-48A2-B5A5-64002D28B95F" }, { "criteria": "cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C1A275E-2152-4A37-8CFE-34E8900E3426" }, { "criteria": "cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7A688A2-3E9C-4AA3-832B-300A5A311C43" }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89098CFF-4696-4BD9-9BC9-D7C2D92FE729" }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30DFFE7-EB73-4A88-A23B-9B386C091314" }, { "criteria": "cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A6C230D-7BAA-4A77-9E96-B1B994F4AAC2" }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD0FE7C5-2C46-4B59-9242-A03B986C07DF" }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C605123-69F9-44AC-A17E-3C728059E628" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41B54C61-FB19-4900-A635-2F6B63BEC88C" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C" } ], "operator": "OR" } ] } ]