FKIE_CVE-2008-3761

Vulnerability from fkie_nvd - Published: 2008-08-21 17:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
hcmon.sys in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 1.0.x before 1.0.9 build 156507 and 2.0.x before 2.0.1 build 156745 uses the METHOD_NEITHER communication method for IOCTLs, which allows local users to cause a denial of service via a crafted IOCTL request.
References
cve@mitre.orghttp://lists.vmware.com/pipermail/security-announce/2009/000054.html
cve@mitre.orghttp://seclists.org/fulldisclosure/2009/Apr/0036.html
cve@mitre.orghttp://securityreason.com/securityalert/4177
cve@mitre.orghttp://www.orange-bat.com/adv/2008/adv.08.17.txt
cve@mitre.orghttp://www.securityfocus.com/bid/30737
cve@mitre.orghttp://www.securityfocus.com/bid/34373
cve@mitre.orghttp://www.securitytracker.com/id?1020715
cve@mitre.orghttp://www.vmware.com/security/advisories/VMSA-2009-0005.html
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/0944
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44539
cve@mitre.orghttps://www.exploit-db.com/exploits/6262
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2009/000054.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2009/Apr/0036.html
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4177
af854a3a-2127-422b-91ae-364da2661108http://www.orange-bat.com/adv/2008/adv.08.17.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30737
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34373
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020715
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2009-0005.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0944
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44539
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/6262
Impacted products
Vendor Product Version
vmware vmware_workstation 6.0.0.45731

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F01ABD8-5C77-422E-849C-E7460072DB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "hcmon.sys in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, and VMware Server 1.0.x before 1.0.9 build 156507 and 2.0.x before 2.0.1 build 156745 uses the METHOD_NEITHER communication method for IOCTLs, which allows local users to cause a denial of service via a crafted IOCTL request."
    },
    {
      "lang": "es",
      "value": "hcmon.sys en VMware Workstation 6.0.0.45731 utiliza el m\u00e9todo de comunicaci\u00f3n METHOD_NEITHER para IOCTLs, lo cual tiene un impacto desconocido (posiblemente ca\u00edda) y vectores de ataque locales a trav\u00e9s de una petici\u00f3n IOCTL manipulada."
    }
  ],
  "id": "CVE-2008-3761",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-21T17:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4177"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.orange-bat.com/adv/2008/adv.08.17.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30737"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34373"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020715"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/0944"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44539"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.orange-bat.com/adv/2008/adv.08.17.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34373"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/0944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6262"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…