CVE-2009-3733
Published Nov 2, 2009
Last updated 6 months ago
Overview
- Description
- Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34" }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35" }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD" }, { "criteria": "cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73EC33AB-E92A-4AA8-A523-C341133BB515" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53197903-0614-4460-8944-C1B5257D71A0" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB051A5C-5F66-4732-949A-48B0FDE4AFF1" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F037B05F-6F92-4BE1-B672-F677CBEFD075" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8DD6D27-1335-44EF-8B69-A9163A67BC2D" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6BFEAE8-0118-4548-A6EA-E90FA8FE7AF9" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87489138-7756-453C-A149-F2C4F95EFF9A" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42049891-38B7-4BB7-8DA5-A87169E2D958" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07139DF7-C36B-4FED-8558-7FA49BE0BCFF" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E0D7307-5946-45DC-88D3-6BC72EF50184" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89699BB6-9E41-41DC-B597-B45CA05313A8" }, { "criteria": "cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C9D09AC-7D9B-4150-86BC-19F44F6F2CA8" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF" }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" } ], "operator": "OR" } ], "operator": "AND" } ]