- Description
- Buffer overflow in OpenPegasus Management server, when compiled to use PAM and with PEGASUS_USE_PAM_STANDALONE_PROC defined, as used in VMWare ESX Server 3.0.1 and 3.0.2, might allow remote attackers to execute arbitrary code via vectors related to PAM authentication, a different vulnerability than CVE-2008-0003.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-119
- Hype score
- Not currently trending
- Red HatNot vulnerable. This issue did not affect versions of tog-pegasus as shipped with Red Hat Enterprise Linux 4, or 5. For more details see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-5360
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openpegasus:management_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7B6F73FB-2E43-4A9D-9EF0-019DA9977E10"
},
{
"criteria": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5C3613B7-CA1B-4C9A-9076-A2894202DDA4"
},
{
"criteria": "cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CE7ECF1C-285C-4AA3-8B66-28EDAB0763E8"
}
],
"operator": "OR"
}
]
}
]