CVE-2009-3733

Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.
References
Link Resource
http://lists.vmware.com/pipermail/security-announce/2009/000069.html Patch Vendor Advisory
http://secunia.com/advisories/37186 Broken Link
http://security.gentoo.org/glsa/glsa-201209-25.xml Third Party Advisory
http://securitytracker.com/id?1023088 Third Party Advisory VDB Entry
http://securitytracker.com/id?1023089 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507523/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36842 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2009-0015.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/3062 Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7822 Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2009/000069.html Patch Vendor Advisory
http://secunia.com/advisories/37186 Broken Link
http://security.gentoo.org/glsa/glsa-201209-25.xml Third Party Advisory
http://securitytracker.com/id?1023088 Third Party Advisory VDB Entry
http://securitytracker.com/id?1023089 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507523/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36842 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2009-0015.html Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/3062 Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7822 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-11-02 15:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-3733

Mitre link : CVE-2009-3733

CVE.ORG link : CVE-2009-3733


JSON object : View

Products Affected

vmware

  • esx
  • esxi
  • server

linux

  • linux_kernel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')