Vulnerability Name: CVE-2007-5023 (CCN-36824) Assigned: 2007-09-18 Published: 2007-09-18 Updated: 2019-08-01 Summary: Unquoted Windows search path vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075, and Server before 1.0.4 Build 56528 allows local users to gain privileges via unspecified vectors, possibly involving a malicious "program.exe" file in the C: folder. CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C )5.1 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
4.4 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P )3.2 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-264 Vulnerability Consequences: Gain Privileges References: Source: MITRE Type: CNACVE-2007-5023 Source: CCN Type: OSVDB ID: 40097VMware Multiple Products C: Folder Search Path Local Privilege Escalation Source: BID Type: Patch, Third Party Advisory, VDB Entry25732 Source: CCN Type: BID-25732VMware Workstation Path Specification Local Privilege Escalation Vulnerability Source: CCN Type: VMware, Inc. Web siteVMware ACE Release Notes Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.vmware.com/support/ace/doc/releasenotes_ace.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.vmware.com/support/player/doc/releasenotes_player.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.vmware.com/support/player2/doc/releasenotes_player2.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.vmware.com/support/server/doc/releasenotes_server.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Source: XF Type: UNKNOWNvmware-searchpath-privilege-escalation(36824) Vulnerable Configuration: Configuration 1 :cpe:/a:vmware:ace:*:*:*:*:*:*:*:* (Version >= 1.0 and <= 1.0.3)OR cpe:/a:vmware:player:*:*:*:*:*:*:*:* (Version >= 1.0.0 and <= 1.0.5) OR cpe:/a:vmware:player:*:*:*:*:*:*:*:* (Version >= 2.0 and <= 2.0.1) OR cpe:/a:vmware:server:*:*:*:*:*:*:*:* (Version >= 1.0 and <= 1.0.4) OR cpe:/a:vmware:workstation:*:*:*:*:*:*:*:* (Version >= 5 and <= 5.5.5) OR cpe:/a:vmware:workstation:*:*:*:*:*:*:*:* (Version >= 6.0 and <= 6.0.1) Configuration 2 :cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:vmware:workstation:5.5.1:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.3:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.4:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.5:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.2:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
vmware ace *
vmware player *
vmware player *
vmware server *
vmware workstation *
vmware workstation *
canonical ubuntu linux 6.06
canonical ubuntu linux 6.10
canonical ubuntu linux 7.04
vmware workstation 5.5.1
vmware workstation 6.0
vmware ace 2.0
vmware ace 1.0
vmware ace 1.0.3
vmware ace 1.0.3_build_54075
vmware ace 2.0.1_build_55017
vmware server 1.0.4_build_56528
vmware workstation 5.5
vmware workstation 5.5.3
vmware workstation 5.5.3_build_34685
vmware workstation 5.5.4
vmware workstation 5.5.5_build_56455
vmware workstation 6.0.1_build_55017
vmware ace 2.0.1
vmware workstation 5.5.5
vmware workstation 6.0.1
vmware ace 1.0.1
vmware ace 1.0.2