CVE-2007-5618

Unquoted Windows search path vulnerability in the Authorization and other services in VMware Player 1.0.x before 1.0.5 and 2.0 before 2.0.1, VMware Server before 1.0.4, and Workstation 5.x before 5.5.5 and 6.x before 6.0.1 might allow local users to gain privileges via malicious programs.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Vendor Advisory
http://secunia.com/advisories/26890 Third Party Advisory
http://www.securityfocus.com/archive/1/489739/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28276 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28289 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0005.html Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html Patch Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html Patch Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html Patch Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Patch Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2007/3229 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0905/references Third Party Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Vendor Advisory
http://secunia.com/advisories/26890 Third Party Advisory
http://www.securityfocus.com/archive/1/489739/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28276 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28289 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0005.html Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html Patch Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html Patch Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html Patch Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Patch Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2007/3229 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0905/references Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-10-21 21:17

Updated : 2025-04-09 00:30


NVD link : CVE-2007-5618

Mitre link : CVE-2007-5618

CVE.ORG link : CVE-2007-5618


JSON object : View

Products Affected

vmware

  • workstation
  • player
  • server