Vulnerabilidad en VMWare ACE 1.0.2 y 2.0.2, Player 1.0.4 y 2.0.2, y Workstation 5.5.4 y 6.0.2, salto de directorio (CVE-2008-0923)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-22
Limitación incorrecta de nombre de ruta a un directorio restringido (Path Traversal)
Fecha de publicación:
26/02/2008
Última modificación:
09/04/2025
Descripción
Vulnerabilidad de salto de directorio en la característica de Archivos Compartidos de VMWare ACE 1.0.2 y 2.0.2, Player 1.0.4 y 2.0.2, y Workstation 5.5.4 y 6.0.2 permite a usuarios de SO invitados leer y escribir archivos de su elección en el SO anfitrión a través de una cadena multibyte que produce una cadena de caracteres ancha que contiene secuencias de .. (punto punto), lo que evita el mecanismo de protección, como se demostró usando una cadena "%c0%2e%c0%2e".
Impacto
Puntuación base 2.0
6.90
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.1_build_19317:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html
- http://lists.vmware.com/pipermail/security-announce/2008/000008.html
- http://secunia.com/advisories/29117
- http://securityreason.com/securityalert/3700
- http://www.coresecurity.com/?action=item&id=2129
- http://www.securityfocus.com/archive/1/488725/100/0/threaded
- http://www.securityfocus.com/archive/1/489739/100/0/threaded
- http://www.securityfocus.com/bid/27944
- http://www.securityfocus.com/bid/28276
- http://www.securitytracker.com/id?1019493=
- http://www.vmware.com/security/advisories/VMSA-2008-0005.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2008/0679
- http://www.vupen.com/english/advisories/2008/0905/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40837
- http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1004034
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060457.html
- http://lists.vmware.com/pipermail/security-announce/2008/000008.html
- http://secunia.com/advisories/29117
- http://securityreason.com/securityalert/3700
- http://www.coresecurity.com/?action=item&id=2129
- http://www.securityfocus.com/archive/1/488725/100/0/threaded
- http://www.securityfocus.com/archive/1/489739/100/0/threaded
- http://www.securityfocus.com/bid/27944
- http://www.securityfocus.com/bid/28276
- http://www.securitytracker.com/id?1019493=
- http://www.vmware.com/security/advisories/VMSA-2008-0005.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2008/0679
- http://www.vupen.com/english/advisories/2008/0905/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40837