CVE-2009-1564
Published Apr 12, 2010
Last updated 15 years ago
Overview
- Description
- Heap-based buffer overflow in vmnc.dll in the VMnc media codec in VMware Movie Decoder before 6.5.4 Build 246459 on Windows, and the movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459, VMware Player 2.5.x before 2.5.4 build 246459, and VMware Server 2.x on Windows, allows remote attackers to execute arbitrary code via an AVI file with crafted video chunks that use HexTile encoding.
- Source
- PSIRT-CNA@flexerasoftware.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:movie_decoder:6.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE79F3F7-A21A-4CAA-BB0D-2955299EE8E0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02" }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC" }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D" }, { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF" }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130" }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" } ]