Vulnerability Name:

CVE-2009-3707 (CCN-53688)

Assigned:2009-10-08
Published:2009-10-08
Updated:2013-05-15
Summary:VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\xFF sequence in the USER and PASS commands, related to a "format string DoS" issue.
Note: some of these details are obtained from third party information.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-134
Vulnerability Consequences:Denial of Service
References:Source: BUGTRAQ
Type: UNKNOWN
20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues

Source: FULLDISC
Type: UNKNOWN
20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues

Source: MITRE
Type: CNA
CVE-2009-3707

Source: MLIST
Type: UNKNOWN
[security-announce] 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues

Source: CCN
Type: SA36988
VMware Authorization Service Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
36988

Source: CCN
Type: SA39206
VMware Products Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
39206

Source: CCN
Type: SA39215
VMware Server Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
39215

Source: GENTOO
Type: UNKNOWN
GLSA-201209-25

Source: CCN
Type: SECTRACK ID: 1022997
VMware Authorization Service Lets Remote Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1022997

Source: CCN
Type: OSVDB ID: 58728
VMware Multiple Products Authorization Service vmware-authd.exe Login Request Format String DoS

Source: CCN
Type: OSVDB ID: 64127
VMware Multiple Products vmware-authd.exe Multiple Command \x25\x90 Sequence Remote DoS

Source: BID
Type: UNKNOWN
36630

Source: CCN
Type: BID-36630
VMware Player and Workstation 'vmware-authd' Remote Denial of Service Vulnerability

Source: MISC
Type: UNKNOWN
http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt

Source: CCN
Type: shinnai - forum ยป Forum
VMware Authorization Service 2.5.3 (vmware-authd.exe) Format String DoS

Source: MISC
Type: UNKNOWN
http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php

Source: MISC
Type: Exploit
http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html

Source: CCN
Type: VMware, Inc. Web site
VMware Player

Source: CCN
Type: VMware Web site
Workstation

Source: CCN
Type: VMSA-2010-0007.1
VMSA-2010-0007.1 | United States

Source: CONFIRM
Type: UNKNOWN
http://www.vmware.com/security/advisories/VMSA-2010-0007.html

Source: XF
Type: UNKNOWN
vmware-authorization-service-dos(53688)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:ace:2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.6:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:server:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:7.0.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:player:2.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:ace:2.5.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware ace 2.5.0
    vmware ace 2.5.1
    vmware ace 2.5.2
    vmware ace 2.5.3
    vmware ace 2.5.4
    vmware ace 2.6
    vmware ace 2.6.1
    vmware player 2.5
    vmware player 2.5.1
    vmware player 2.5.2
    vmware player 2.5.3
    vmware player 2.5.4
    vmware player 3.0
    vmware player 3.0.1
    vmware server 2.0.0
    vmware server 2.0.1
    vmware server 2.0.2
    vmware workstation 6.5.0
    vmware workstation 6.5.1
    vmware workstation 6.5.2
    vmware workstation 6.5.3
    vmware workstation 6.5.4
    vmware workstation 7.0
    vmware workstation 7.0.1
    vmware workstation 6.5.3
    vmware player 2.5.2
    vmware player 2.5.3
    vmware ace 2.5.3