CVE-2009-4811

VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\x90 sequence in the USER and PASS commands, a related issue to CVE-2009-3707. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:10

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html - () http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html -
References () http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html - () http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html -
References () http://freetexthost.com/qr1tffkzpu - Exploit, URL Repurposed () http://freetexthost.com/qr1tffkzpu - Exploit, URL Repurposed
References () http://lists.vmware.com/pipermail/security-announce/2010/000090.html - Patch, Vendor Advisory () http://lists.vmware.com/pipermail/security-announce/2010/000090.html - Patch, Vendor Advisory
References () http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html - Exploit () http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html - Exploit
References () http://security.gentoo.org/glsa/glsa-201209-25.xml - () http://security.gentoo.org/glsa/glsa-201209-25.xml -
References () http://www.securityfocus.com/bid/36630 - Exploit () http://www.securityfocus.com/bid/36630 - Exploit
References () http://www.vmware.com/security/advisories/VMSA-2010-0007.html - Patch, Vendor Advisory () http://www.vmware.com/security/advisories/VMSA-2010-0007.html - Patch, Vendor Advisory

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://freetexthost.com/qr1tffkzpu - Exploit () http://freetexthost.com/qr1tffkzpu - Exploit, URL Repurposed

Information

Published : 2010-04-27 15:30

Updated : 2024-11-21 01:10


NVD link : CVE-2009-4811

Mitre link : CVE-2009-4811

CVE.ORG link : CVE-2009-4811


JSON object : View

Products Affected

vmware

  • player
  • server
  • ace
  • workstation
CWE
CWE-134

Use of Externally-Controlled Format String