CVE-2009-0518
Published Apr 6, 2009
Last updated 7 years ago
Overview
- Description
- VI Client in VMware VirtualCenter before 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93F8BE4D-EF33-4CC8-B66B-16ADE1CCBB63" }, { "criteria": "cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C25C336B-B4BC-4FDF-8FD2-F90783841EB4" }, { "criteria": "cpe:2.3:a:vmware:vmware_virtualcenter:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6314167B-74F5-465B-8082-51CDCBCC24CE" }, { "criteria": "cpe:2.3:a:vmware:vmware_virtualcenter:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FF04F98-E574-4A18-B89C-5AA2A8C67226" }, { "criteria": "cpe:2.3:a:vmware:vmware_virtualcenter:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CC4B360-6460-4327-8A88-6CE5463BC8B5" }, { "criteria": "cpe:2.3:a:vmware:vmware_virtualcenter:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41671F9F-C0FA-4D7F-9E31-EE114DB4F5A7" }, { "criteria": "cpe:2.3:a:vmware:vmware_virtualcenter:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A5CB5CB-B259-4081-9358-2A48AF82860D" }, { "criteria": "cpe:2.3:a:vmware:vmware_virtualcenter:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0C57B5A-1175-4F6E-8138-915B3DDBB91C" } ], "operator": "OR" } ] } ]