Overview
- Description
- Buffer overflow in OpenPegasus Management server, when compiled to use PAM and with PEGASUS_USE_PAM_STANDALONE_PROC defined, as used in VMWare ESX Server 3.0.1 and 3.0.2, might allow remote attackers to execute arbitrary code via vectors related to PAM authentication, a different vulnerability than CVE-2008-0003.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatNot vulnerable. This issue did not affect versions of tog-pegasus as shipped with Red Hat Enterprise Linux 4, or 5. For more details see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-5360
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openpegasus:management_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6F73FB-2E43-4A9D-9EF0-019DA9977E10" }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C3613B7-CA1B-4C9A-9076-A2894202DDA4" }, { "criteria": "cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE7ECF1C-285C-4AA3-8B66-28EDAB0763E8" } ], "operator": "OR" } ] } ]