CVE-2010-1138
Published Apr 12, 2010
Last updated 12 years ago
Overview
- Description
- The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E" }, { "criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F747AC1-E163-41A4-BAC7-FDF46F4057D5" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE944A70-CB9C-4712-9802-509531396A02" }, { "criteria": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "252D2C0B-B89A-4C89-8D6B-6A8E58FCD8DC" }, { "criteria": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62DA49FA-6657-45B5-BF69-D3A03BA62A4D" }, { "criteria": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "949C3917-4D7E-4B51-A872-BFBECB4D2CB2" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B71537AE-346D-4BA9-90E7-EA0AB0CD0886" }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5674C3DD-F510-4701-ACA8-437576307528" }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E62960B2-91AE-4DD7-8085-9BA6BCB84473" }, { "criteria": "cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBCA2A03-0A31-4290-987A-BE715758BA95" }, { "criteria": "cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E87681DB-CBD8-46A6-BD9A-FB621B627B0E" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A2543D5-AE09-4E90-B27E-95075BE4ACBF" }, { "criteria": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6CFDD84-A482-42C2-B43F-839F4D7F1130" }, { "criteria": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E565F23-AEEE-41A4-80EC-01961AD5560E" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E18541B-36B6-40A7-9749-FA47A10379C8" }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55EBD95F-3DF7-49F3-A7AA-47085E0B7C88" }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6DA47C9-3D1A-49A7-8976-AE05D6730673" }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "692CC131-5C6C-4AD6-B85C-07DF21168BC8" }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "617EFBFF-D047-4A0B-ACB6-83B27710F6F8" }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1D0DF91-17E8-45D4-B625-737FE50C23CF" }, { "criteria": "cpe:2.3:a:vmware:fusion:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6C47EB8-8844-4D49-9246-008F7AE45C60" }, { "criteria": "cpe:2.3:a:vmware:fusion:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26B7268F-A170-4366-9196-E73A956883DF" } ], "operator": "OR" } ] } ]