CVE-2008-3693
Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-3691, CVE-2008-3692, CVE-2008-3694, CVE-2008-3695, and CVE-2008-3696.
Published
2008-09-03T14:12:00.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 10.0 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31707
Patch, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31708
Patch, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31709
Patch, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31710
Patch, Third Party Advisory
([email protected])
-
http://securityreason.com/securityalert/4202
Third Party Advisory
([email protected])
-
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/30934
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id?1020791
Third Party Advisory, VDB Entry
([email protected])
-
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/player/doc/releasenotes_player.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/server/doc/releasenotes_server.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Vendor Advisory
([email protected])
-
http://www.vupen.com/english/advisories/2008/2466
Third Party Advisory
([email protected])
-
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31707
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31708
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31709
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31710
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securityreason.com/securityalert/4202
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/30934
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1020791
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/security/advisories/VMSA-2008-0014.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/player/doc/releasenotes_player.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/server/doc/releasenotes_server.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2008/2466
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)