Vulnerability Name: | CVE-2007-4496 (CCN-36725) | ||||||||
Assigned: | 2007-09-18 | ||||||||
Published: | 2007-09-18 | ||||||||
Updated: | 2019-08-01 | ||||||||
Summary: | Unspecified vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows authenticated users with administrative privileges on a guest operating system to corrupt memory and possibly execute arbitrary code on the host operating system via unspecified vectors. | ||||||||
CVSS v3 Severity: | 8.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:A/AC:H/Au:S/C:C/I:C/A:C) 4.8 Medium (Temporal CVSS v2 Vector: AV:A/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-399 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Wed Sep 19 2007 - 21:15:23 CDT VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player Source: MITRE Type: CNA CVE-2007-4496 Source: FULLDISC Type: Third Party Advisory 20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player Source: CCN Type: VMware Security-announce Mailing list, Wed Sep 19 19:15:23 PDT 2007 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player Source: CCN Type: SA26890 VMWare Products Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 26890 Source: CCN Type: SA26909 VMware ESX Server Multiple Security Updates Source: SECUNIA Type: Third Party Advisory 27694 Source: SECUNIA Type: Third Party Advisory 27706 Source: GENTOO Type: Third Party Advisory GLSA-200711-23 Source: CCN Type: SECTRACK ID: 1018718 VMware Lets Local Users Gain Privileges or Cause Denial of Service Conditions on the Host System Source: CCN Type: GLSA-200711-23 VMware Workstation and Player: Multiple vulnerabilities Source: CCN Type: OSVDB ID: 40095 VMware Multiple Products Unspecified Administrative Memory Corruption Guest Image Privilege Escalation Source: BID Type: Patch, Third Party Advisory, VDB Entry 25728 Source: CCN Type: BID-25728 VMware Workstation Unspecified Host Memory Corruption Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1018718 Source: CCN Type: USN-543-1 VMWare vulnerabilities Source: UBUNTU Type: Third Party Advisory USN-543-1 Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/ace/doc/releasenotes_ace.html Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/player/doc/releasenotes_player.html Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/player2/doc/releasenotes_player2.html Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/server/doc/releasenotes_server.html Source: CCN Type: VMware, Inc. Web site Download Patch ESX-8258730 for VMware ESX Server 3.0.1 Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Source: CONFIRM Type: Patch, Vendor Advisory http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Source: VUPEN Type: Permissions Required ADV-2007-3229 Source: XF Type: UNKNOWN vmware-host-code-execution(36725) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |