CVE-2007-0061
Published Sep 21, 2007
Last updated 5 years ago
Overview
- Description
- The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory."
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of dhcp as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BE329FB-74A5-4D8C-B5D5-C6063CAAB479", "versionEndExcluding": "1.0.3", "versionStartIncluding": "1.0" }, { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "310A0A72-A709-407D-A68D-24EF59EEC553", "versionEndExcluding": "2.0.1", "versionStartIncluding": "2.0" }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B87BD440-71B2-4D1C-B22A-A661D01928C0", "versionEndExcluding": "1.0.5", "versionStartIncluding": "1.0" }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35A00737-2932-4877-8E02-1F9534C6FBAE", "versionEndExcluding": "2.0.1", "versionStartIncluding": "2.0" }, { "criteria": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02269212-A8EE-4BB2-8C6E-122953AAFB83", "versionEndExcluding": "1.0.4", "versionStartIncluding": "1.0" }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27920879-1408-4514-BA3F-B31DD69FACA2", "versionEndExcluding": "5.5.5", "versionStartIncluding": "5.5" }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1ACA1016-EAC5-4210-ABDC-C2499F2841EA", "versionEndExcluding": "6.0.1", "versionStartIncluding": "6.0" }, { "criteria": "cpe:2.3:o:vmware:esx:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "796BEFD3-F30A-4397-BC3E-1156DE47CA4C" }, { "criteria": "cpe:2.3:o:vmware:esx:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F9F768C-5549-4498-8C5D-13BC5046B721" }, { "criteria": "cpe:2.3:o:vmware:esx:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01BB3005-A185-4701-945E-8E14A23A016F" }, { "criteria": "cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1BA6DF4-4D53-482A-8820-B9B0E6EBD51D" }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "974D84A6-F5AB-4F0A-B9B5-9095A0E4733C" }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C3613B7-CA1B-4C9A-9076-A2894202DDA4" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501" } ], "operator": "OR" } ] } ]