CVE-2008-1363

VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."
References
Link Resource
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Vendor Advisory
http://security.gentoo.org/glsa/glsa-201209-25.xml Third Party Advisory
http://securityreason.com/securityalert/3755 Third Party Advisory
http://securitytracker.com/id?1019622 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/489739/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28276 Patch Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0005.html Patch Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Patch Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html Patch Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html Patch Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html Patch Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Patch Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/0905/references Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 Third Party Advisory VDB Entry
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Vendor Advisory
http://security.gentoo.org/glsa/glsa-201209-25.xml Third Party Advisory
http://securityreason.com/securityalert/3755 Third Party Advisory
http://securitytracker.com/id?1019622 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/489739/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/28276 Patch Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0005.html Patch Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html Patch Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html Patch Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html Patch Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html Patch Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html Patch Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/0905/references Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41252 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
OR cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2008-03-20 00:44

Updated : 2025-04-09 00:30


NVD link : CVE-2008-1363

Mitre link : CVE-2008-1363

CVE.ORG link : CVE-2008-1363


JSON object : View

Products Affected

vmware

  • ace
  • player
  • workstation
  • server

microsoft

  • windows
CWE
CWE-264

Permissions, Privileges, and Access Controls