CVE-2008-4915
Published Nov 10, 2008
Last updated 6 years ago
Overview
- Description
- The CPU hardware emulation in VMware Workstation 6.0.5 and earlier and 5.5.8 and earlier; Player 2.0.x through 2.0.5 and 1.0.x through 1.0.8; ACE 2.0.x through 2.0.5 and earlier, and 1.0.x through 1.0.7; Server 1.0.x through 1.0.7; ESX 2.5.4 through 3.5; and ESXi 3.5, when running 32-bit and 64-bit guest operating systems, does not properly handle the Trap flag, which allows authenticated guest OS users to gain privileges on the guest OS.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "303FD815-1A0D-41ED-AD0E-91BFC82C6E3B", "versionEndIncluding": "1.0.7", "versionStartIncluding": "1.0" }, { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "403B0C68-7F85-438C-95E2-5B6FDCF00E7C", "versionEndIncluding": "2.0.5", "versionStartIncluding": "2.0" }, { "criteria": "cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AFBA799-7EC3-4DE3-BF3C-FA7C1C1E7632", "versionEndIncluding": "3.5", "versionStartIncluding": "2.5.4" }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD" }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44A6CE08-8BAB-4BCC-87AE-FA433CD1AC67", "versionEndIncluding": "1.0.8", "versionStartIncluding": "1.0.0" }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA8737EE-4163-4B99-873A-21FC9748087A", "versionEndIncluding": "2.0.5", "versionStartIncluding": "2.0" }, { "criteria": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B39E558-D6F4-4271-848C-E87A2CAD4A33", "versionEndIncluding": "1.0.7", "versionStartIncluding": "1.0" }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEFA048E-E58D-481F-BE83-FF26795A0F7C", "versionEndIncluding": "5.5.8", "versionStartIncluding": "5.5" }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1598C125-3339-4917-BCB6-A7F361887E15", "versionEndIncluding": "6.0.5", "versionStartIncluding": "6.0" } ], "operator": "OR" } ] } ]