![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.801027 |
Kategorie: | Denial of Service |
Titel: | VMware Authorization Service DoS Vulnerability (CVE-2009-3707) - Windows |
Zusammenfassung: | VMWare product(s) are prone to a denial of service (DoS) vulnerability. |
Beschreibung: | Summary: VMWare product(s) are prone to a denial of service (DoS) vulnerability. Vulnerability Insight: The vulnerability is due to an error in the VMware Authorization Service when processing login requests. This can be exploited to terminate the 'vmware-authd' process via 'USER' or 'PASS' strings containing '\xFF' characters, sent to TCP port 912. Vulnerability Impact: Successful exploitation allows attackers to execute arbitrary code on the affected application and causes the Denial of Service. Affected Software/OS: VMware ACE 2.5.3 and prior. VMware Player 2.5.3 build 185404 and prior. VMware Workstation 6.5.3 build 185404 and prior. Solution: Upgrade VMware ACE to 2.5.4 build 246459 or later, Upgrade VMware Player to 2.5.4 build 246459 or later, Upgrade VMware Workstation to 6.5.4 build 246459 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-3707 BugTraq ID: 36630 http://www.securityfocus.com/bid/36630 Bugtraq: 20100409 VMSA-2010-0007 VMware hosted products, vCenter Server and ESX patches resolve multiple security issues (Google Search) http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html http://security.gentoo.org/glsa/glsa-201209-25.xml http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html http://lists.vmware.com/pipermail/security-announce/2010/000090.html http://securitytracker.com/id?1022997 http://secunia.com/advisories/36988 http://secunia.com/advisories/39206 http://secunia.com/advisories/39215 |
Copyright | Copyright (C) 2009 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |