Vulnerability Name:

CVE-2008-2097 (CCN-42875)

Assigned:2008-06-04
Published:2008-06-04
Updated:2018-10-11
Summary:Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length."
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
6.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2008-2097

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:012

Source: CCN
Type: SA30556
VMware Products Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
30556

Source: SECUNIA
Type: Vendor Advisory
30581

Source: SREASON
Type: UNKNOWN
3922

Source: CCN
Type: SECTRACK ID: 1020199
VMware ESX Openwsman Lets Local Users Gain Root Privileges

Source: SECTRACK
Type: UNKNOWN
1020199

Source: CCN
Type: OSVDB ID: 46089
VMware openwsman Management Service Content-Length Processing Remote Overflow

Source: BUGTRAQ
Type: UNKNOWN
20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues

Source: BID
Type: UNKNOWN
29547

Source: CCN
Type: BID-29547
VMware Openwsman on ESX and ESXi Local Privilege Escalation Vulnerability

Source: CCN
Type: VMSA-2008-0009
Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues

Source: CONFIRM
Type: Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2008-0009.html

Source: VUPEN
Type: Vendor Advisory
ADV-2008-1744

Source: XF
Type: UNKNOWN
vmware-openwsman-privilege-escalation(42875)

Source: XF
Type: UNKNOWN
vmware-openwsman-privilege-escalation(42875)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5640

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5759

Source: SUSE
Type: SUSE-SR:2008:012
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:esx:3.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esxi:3.5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:esx_server:3.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20082097
    V
    CVE-2008-2097
    2012-11-01
    oval:org.mitre.oval:def:5640
    V
    VMware ESX Openwsman Lets Local Users Gain Root Privileges
    2010-05-17
    oval:org.mitre.oval:def:5759
    V
    VMware ESX Openwsman Lets Local Users Gain Root Privileges
    2010-05-17
    BACK
    vmware esx 3.5
    vmware esxi 3.5
    vmware esx server 3.5