7.3 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.195 Low
EPSS
Percentile
96.2%
The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers “corrupt stack memory.”
lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
secunia.com/advisories/26890
secunia.com/advisories/27694
secunia.com/advisories/27706
security.gentoo.org/glsa/glsa-200711-23.xml
www.iss.net/threats/275.html
www.securityfocus.com/bid/25729
www.securitytracker.com/id?1018717
www.ubuntu.com/usn/usn-543-1
www.vmware.com/support/ace/doc/releasenotes_ace.html
www.vmware.com/support/ace2/doc/releasenotes_ace2.html
www.vmware.com/support/player/doc/releasenotes_player.html
www.vmware.com/support/player2/doc/releasenotes_player2.html
www.vmware.com/support/server/doc/releasenotes_server.html
www.vmware.com/support/ws55/doc/releasenotes_ws55.html
www.vmware.com/support/ws6/doc/releasenotes_ws6.html
www.vupen.com/english/advisories/2007/3229
exchange.xforce.ibmcloud.com/vulnerabilities/33101