6.7 Medium
AI Score
Confidence
Low
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
17.9%
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for “hijacking the VMX process.”
lists.vmware.com/pipermail/security-announce/2008/000008.html
security.gentoo.org/glsa/glsa-201209-25.xml
securityreason.com/securityalert/3755
securitytracker.com/id?1019622
www.securityfocus.com/archive/1/489739/100/0/threaded
www.securityfocus.com/bid/28276
www.vmware.com/security/advisories/VMSA-2008-0005.html
www.vmware.com/support/ace2/doc/releasenotes_ace2.html
www.vmware.com/support/player/doc/releasenotes_player.html
www.vmware.com/support/player2/doc/releasenotes_player2.html
www.vmware.com/support/server/doc/releasenotes_server.html
www.vmware.com/support/ws55/doc/releasenotes_ws55.html
www.vmware.com/support/ws6/doc/releasenotes_ws6.html
www.vupen.com/english/advisories/2008/0905/references
exchange.xforce.ibmcloud.com/vulnerabilities/41252