CVE-2008-3892
Buffer overflow in a certain ActiveX control in the COM API in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a call to the GuestInfo method in which there is a long string argument, and an assignment of a long string value to the result of this call. NOTE: this may overlap CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, or CVE-2008-3696.
Published
2008-09-03T14:12:00.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 10.0 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31707
Patch, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31708
Patch, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31709
Patch, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/31710
Patch, Third Party Advisory
([email protected])
-
http://securityreason.com/securityalert/4202
Third Party Advisory
([email protected])
-
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/29503
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/30934
Third Party Advisory, VDB Entry
([email protected])
-
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/player/doc/releasenotes_player.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/server/doc/releasenotes_server.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Vendor Advisory
([email protected])
-
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Vendor Advisory
([email protected])
-
http://www.vupen.com/english/advisories/2008/2466
Third Party Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43062
VDB Entry
([email protected])
-
https://www.exploit-db.com/exploits/6345
Third Party Advisory, VDB Entry
([email protected])
-
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31707
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31708
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31709
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/31710
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securityreason.com/securityalert/4202
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/29503
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/30934
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/player/doc/releasenotes_player.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/server/doc/releasenotes_server.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2008/2466
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43062
VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/6345
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)