Vulnerability Name:

CVE-2007-5023 (CCN-36824)

Assigned:2007-09-18
Published:2007-09-18
Updated:2019-08-01
Summary:Unquoted Windows search path vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075, and Server before 1.0.4 Build 56528 allows local users to gain privileges via unspecified vectors, possibly involving a malicious "program.exe" file in the C: folder.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.1 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.4 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2007-5023

Source: CCN
Type: OSVDB ID: 40097
VMware Multiple Products C: Folder Search Path Local Privilege Escalation

Source: BID
Type: Patch, Third Party Advisory, VDB Entry
25732

Source: CCN
Type: BID-25732
VMware Workstation Path Specification Local Privilege Escalation Vulnerability

Source: CCN
Type: VMware, Inc. Web site
VMware ACE Release Notes

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.vmware.com/support/ace/doc/releasenotes_ace.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Source: XF
Type: UNKNOWN
vmware-searchpath-privilege-escalation(36824)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:ace:*:*:*:*:*:*:*:* (Version >= 1.0 and <= 1.0.3)
  • OR cpe:/a:vmware:player:*:*:*:*:*:*:*:* (Version >= 1.0.0 and <= 1.0.5)
  • OR cpe:/a:vmware:player:*:*:*:*:*:*:*:* (Version >= 2.0 and <= 2.0.1)
  • OR cpe:/a:vmware:server:*:*:*:*:*:*:*:* (Version >= 1.0 and <= 1.0.4)
  • OR cpe:/a:vmware:workstation:*:*:*:*:*:*:*:* (Version >= 5 and <= 5.5.5)
  • OR cpe:/a:vmware:workstation:*:*:*:*:*:*:*:* (Version >= 6.0 and <= 6.0.1)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:1.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware ace *
    vmware player *
    vmware player *
    vmware server *
    vmware workstation *
    vmware workstation *
    canonical ubuntu linux 6.06
    canonical ubuntu linux 6.10
    canonical ubuntu linux 7.04
    vmware workstation 5.5.1
    vmware workstation 6.0
    vmware ace 2.0
    vmware ace 1.0
    vmware ace 1.0.3
    vmware ace 1.0.3_build_54075
    vmware ace 2.0.1_build_55017
    vmware server 1.0.4_build_56528
    vmware workstation 5.5
    vmware workstation 5.5.3
    vmware workstation 5.5.3_build_34685
    vmware workstation 5.5.4
    vmware workstation 5.5.5_build_56455
    vmware workstation 6.0.1_build_55017
    vmware ace 2.0.1
    vmware workstation 5.5.5
    vmware workstation 6.0.1
    vmware ace 1.0.1
    vmware ace 1.0.2