CVE-2008-1362
Published Mar 20, 2008
Last updated 6 years ago
Overview
- Description
- VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges or cause a denial of service by impersonating the authd process through an unspecified use of an "insecurely created named pipe," a different vulnerability than CVE-2008-1361.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F20A8E8-E07D-41B2-899F-2ABA9DD1C2C6" }, { "criteria": "cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8E1A5AA-BD9F-4263-B7C6-E744323C4D74" }, { "criteria": "cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47B13A58-1876-4322-AC25-107D43BABD2A" }, { "criteria": "cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D04A928-4421-4BEE-9500-7398E4DB929B" }, { "criteria": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F2F6AF4-5987-43BC-9183-5DF7D6DE1EFE" }, { "criteria": "cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "088450C4-9C6F-4651-8D59-C36F1B0601BC" }, { "criteria": "cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F7AD12A-26C9-48AD-A32A-0F56545DF8E4" }, { "criteria": "cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73C45BB0-C0DB-42B8-A238-B81D836CF91E" }, { "criteria": "cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "297226F7-05CB-4721-9D02-51FE2919D2DA" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8DD6D27-1335-44EF-8B69-A9163A67BC2D" }, { "criteria": "cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6968BBA4-3A55-4495-ACB2-6F7535EBEAF6" }, { "criteria": "cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6FFF35E-DCFC-4C13-8C5A-7CE80A161370" }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EBD26B9-60A6-4D6B-B031-0DA8A9F3323F" }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B7632A4-D120-434D-B35A-303640DB37AB" }, { "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DFFE01E-BD0A-432E-B47C-D68DAADDD075" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3CF9F67-DE1A-4CB0-B3AB-B28DC8C02C4C" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51C6D608-64DE-4CC4-9869-3342E8FD707F" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDEAB605-03F6-4968-8A48-126C7C711043" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16A1141D-9718-4A22-8FF2-AEAD28E07291" }, { "criteria": "cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE2ADE72-4F19-4E73-AC3E-7038FE0D38B8" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89329F80-7134-4AB2-BDA3-E1B887F633B0" } ], "operator": "OR" } ] } ]