CVE-2008-1340 Details

CVE-2008-1340

Published: 2008-03-20
Last Modified: 2018-10-11
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Virtual Machine Communication Interface (VMCI) in VMware Workstation 6.0.x before 6.0.3, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 allows attackers to cause a denial of service (host OS crash) via crafted VMCI calls that trigger "memory exhaustion and memory corruption."

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 7.1/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 6.9/10
Confidentiality Impact None
Availability Impact Complete
Integrity Impact None
Vector String AV:N/AC:M/Au:N/C:N/I:N/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:* Yes - -
References

http://lists.vmware.com/pipermail/security-announce/2008/000008.html
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://securityreason.com/securityalert/3755
http://securitytracker.com/id?1019624
http://www.securityfocus.com/archive/1/489739/100/0/threaded
http://www.securityfocus.com/bid/28276
http://www.securityfocus.com/bid/28289
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2008/0905/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41250

CVE ID
CVE-2008-1340
Published
2008-03-20
Modified
2018-10-11
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-399

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.