CVE-2008-1361
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-264
Permisos, privilegios y/o control de acceso
Fecha de publicación:
20/03/2008
Última modificación:
09/04/2025
Descripción
VMware Workstation versiones 6.0.x anteriores a 6.0.3 y 5.5.x anteriores a 5.5.6, VMware Player versiones 2.0.x anteriores a 2.0.3 y 1.0.x anteriores a 1.0.6, VMware ACE versiones 2.0.x anteriores a 2.0.1 y 1.0.x anteriores a 1.0.5, y VMware Server versiones 1.0.x anteriores a 1.0.5 para Windows permite a usuarios locales conseguir privilegios mediante una manipulación no específica que causa que el proceso authd conecte con un nombre de tubería de su elección, siendo una vulnerabilidad diferente que CVE-2008-1362.
Impacto
Puntuación base 2.0
6.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.vmware.com/pipermail/security-announce/2008/000008.html
- http://security.gentoo.org/glsa/glsa-201209-25.xml
- http://securityreason.com/securityalert/3755
- http://securitytracker.com/id?1019621=
- http://www.securityfocus.com/archive/1/489739/100/0/threaded
- http://www.securityfocus.com/bid/28276
- http://www.vmware.com/security/advisories/VMSA-2008-0005.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/server/doc/releasenotes_server.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2008/0905/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41257
- http://lists.vmware.com/pipermail/security-announce/2008/000008.html
- http://security.gentoo.org/glsa/glsa-201209-25.xml
- http://securityreason.com/securityalert/3755
- http://securitytracker.com/id?1019621=
- http://www.securityfocus.com/archive/1/489739/100/0/threaded
- http://www.securityfocus.com/bid/28276
- http://www.vmware.com/security/advisories/VMSA-2008-0005.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/server/doc/releasenotes_server.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2008/0905/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41257



