CVE-2008-0923
Published Feb 26, 2008
Last updated 6 years ago
Overview
- Description
- Directory traversal vulnerability in the Shared Folders feature for VMWare ACE 1.0.2 and 2.0.2, Player 1.0.4 and 2.0.2, and Workstation 5.5.4 and 6.0.2 allows guest OS users to read and write arbitrary files on the host OS via a multibyte string that produces a wide character string containing .. (dot dot) sequences, which bypasses the protection mechanism, as demonstrated using a "%c0%2e%c0%2e" string.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6" }, { "criteria": "cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D346E48-887C-4D02-BFD3-D323B7F3871C" }, { "criteria": "cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8E1A5AA-BD9F-4263-B7C6-E744323C4D74" }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D22E40D-C362-49FD-924C-262A64555934" }, { "criteria": "cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A48CEB4-5864-4A0F-B14C-CFE4699C3311" }, { "criteria": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE" }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.1_build_19317:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7764D48A-2D43-413F-9214-AE754DDCF68F" }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65DD6966-72EA-4C4D-BC90-B0D534834BA8" }, { "criteria": "cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBFC9B7A-8A40-467B-9102-EE5259EC4D14" }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B7632A4-D120-434D-B35A-303640DB37AB" }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DFFE01E-BD0A-432E-B47C-D68DAADDD075" }, { "criteria": "cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD0FE7C5-2C46-4B59-9242-A03B986C07DF" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51C6D608-64DE-4CC4-9869-3342E8FD707F" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16A1141D-9718-4A22-8FF2-AEAD28E07291" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89329F80-7134-4AB2-BDA3-E1B887F633B0" } ], "operator": "OR" } ] } ]