CVE-2008-1361

Severity

68%

Complexity

31%

Confidentiality

165%

VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362.

VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362.

CVSS 2.0 Base Score 6.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C).

Overview

First reported 16 years ago

2008-03-20 00:44:00

Last updated 6 years ago

2018-10-11 20:32:00

Affected Software

VMWare ACE 1.0

1.0

VMware ACE 1.0.1

1.0.1

VMware ACE 1.0.2

1.0.2

VMWare ACE 1.0.3

1.0.3

VMware ACE 1.0.4

1.0.4

VMWare ACE 2.0

2.0

VMware Player 1.0.2

1.0.2

VMware Player 1.0.3

1.0.3

VMWare Player 1.0.4

1.0.4

VMware Player 1.0.5

1.0.5

VMWare Player 2.0

2.0

VMware Player 2.0.1

2.0.1

VMware Player 2.0.2

2.0.2

VMWare Server 1.0.3

1.0.3

VMWare VMWare 5.5

5.5

VMWare VMWare Workstation 5.5.3 build 34685

5.5.3_build_34685

VMWare VMWare Workstation 5.5.3 build 42958

5.5.3_build_42958

VMWare VMWare 5.5.4

5.5.4

VMWare VMWare Workstation 5.5.4 build 44386

5.5.4_build_44386

VMWare VMWare 6.0

6.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.