| Title | VMware Authorization Service の VMware Authentication Daemon におけるサービス運用妨害 (DoS) の脆弱性 |
|---|---|
| Summary | 複数の VMware 製品の VMware Authorization Service の VMware Authentication Daemon には、サービス運用妨害 (DoS) 状態となる脆弱性が存在します。 |
| Possible impacts | 第三者により、USER および PASS コマンドの \x25\xFF シーケンスを介して、サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 16, 2009, midnight |
| Registration Date | May 7, 2010, 5:26 p.m. |
| Last Update | May 7, 2010, 5:26 p.m. |
| CVSS2.0 : 警告 | |
| Score | 5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| VMware |
| VMware ACE 2.5.x |
| VMware ACE 2.6 |
| VMware Player 2.5.x |
| VMware Player 3.0 |
| VMware Server 2.x |
| VMware Workstation 6.5.x |
| VMware Workstation 7.0 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2010年05月07日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware Player 3.0 before 3.0.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, and VMware Server 2.x allows remote attackers to cause a denial of service (process crash) via a \x25\xFF sequence in the USER and PASS commands, related to a "format string DoS" issue. NOTE: some of these details are obtained from third party information. |
|---|---|
| Publication Date | Oct. 17, 2009, 1:30 a.m. |
| Registration Date | Jan. 29, 2021, 1:24 p.m. |
| Last Update | Feb. 14, 2024, 10:17 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:* | |||||