7.4 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.204 Low
EPSS
Percentile
96.3%
Buffer overflow in OpenPegasus Management server, when compiled to use PAM and with PEGASUS_USE_PAM_STANDALONE_PROC defined, as used in VMWare ESX Server 3.0.1 and 3.0.2, might allow remote attackers to execute arbitrary code via vectors related to PAM authentication, a different vulnerability than CVE-2008-0003.
CPE | Name | Operator | Version |
---|---|---|---|
openpegasus:management_server | openpegasus management server | eq | * |
vmware:esx | vmware esx | eq | 3.0.2 |
vmware:esx | vmware esx | eq | 3.0.1 |
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01438409
lists.vmware.com/pipermail/security-announce/2008/000002.html
secunia.com/advisories/28358
secunia.com/advisories/28368
secunia.com/advisories/28636
secunia.com/advisories/29986
securityreason.com/securityalert/3538
www.attrition.org/pipermail/vim/2008-January/001879.html
www.novell.com/linux/security/advisories/suse_security_summary_report.html
www.securityfocus.com/archive/1/485936/100/0/threaded
www.securityfocus.com/archive/1/486859/100/0/threaded
www.vmware.com/security/advisories/VMSA-2008-0001.html
www.vupen.com/english/advisories/2008/0063
www.vupen.com/english/advisories/2008/0064
www.vupen.com/english/advisories/2008/1391/references
bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-5360
exchange.xforce.ibmcloud.com/vulnerabilities/39524