CVE-2009-3732
Published Apr 12, 2010
Last updated 2 years ago
Overview
- Description
- Format string vulnerability in vmware-vmrc.exe build 158248 in VMware Remote Console (aka VMrc) allows remote attackers to execute arbitrary code via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-134
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2579A3BF-B7C0-4052-8D6A-31E872ECD2B6", "versionEndExcluding": "2.5.4", "versionStartIncluding": "2.5.0" }, { "criteria": "cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E87681DB-CBD8-46A6-BD9A-FB621B627B0E" }, { "criteria": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B66157E4-285D-4975-BED8-9A52326F2100", "versionEndExcluding": "2.5.4", "versionStartIncluding": "2.5.0" }, { "criteria": "cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F747AC1-E163-41A4-BAC7-FDF46F4057D5" }, { "criteria": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F9554F5-950A-422F-BC26-80C1BCCDD792", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0" }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "662DDDC1-E5A9-4D11-BC2E-66E05FBEB5AB", "versionEndExcluding": "6.5.4", "versionStartIncluding": "6.5.0" }, { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ], "operator": "OR" } ], "operator": "AND" } ]