CVE-2011-2145
Published Jun 6, 2011
Last updated 7 years ago
Overview
- Description
- mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 through 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.3
- Impact score
- 9.2
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B6F7416-E694-4EC9-9FE5-0C24448ECB34" }, { "criteria": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5ECA1B-7415-4390-8018-670F2C3CDF35" }, { "criteria": "cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "889DE9BE-886F-4BEF-A794-5B5DE73D2322" }, { "criteria": "cpe:2.3:a:vmware:esx:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D3C6FC4-DAE3-42DB-B845-593BBD2A50BF" }, { "criteria": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD59C463-F352-4F6C-853F-415E3FB4ABDD" }, { "criteria": "cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BDAA7C8-8F2F-4037-A517-2C1EDB70B203" }, { "criteria": "cpe:2.3:a:vmware:esxi:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73C9E205-87EE-4CE2-A252-DED7BB6D4EAE" }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "051D820C-E5F4-4DA2-8914-5A33FCFF2D1B" }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69FFA61C-2258-4006-AECA-D324F5700990" }, { "criteria": "cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50D2840A-5AF2-4AC4-9243-07CE93E9E9B1" }, { "criteria": "cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C158CD97-41BA-4422-9A55-B1A8650A0900" }, { "criteria": "cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "477D5F22-7DDD-461D-9CD1-2B2A968F6CB7" }, { "criteria": "cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C174C452-7249-4B26-9F26-DFE9B3476874" }, { "criteria": "cpe:2.3:a:vmware:player:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAA72ED8-3229-4220-BE75-712CA6E21062" }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D" }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4" }, { "criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D9EC02F3-3905-460D-8949-3B26394215CA" }, { "criteria": "cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "05924C67-F9A0-450E-A5B8-059651DD32E3" } ], "operator": "OR" } ], "operator": "AND" } ]