First published: Tue Jan 08 2008(Updated: )
Buffer overflow in OpenPegasus Management server, when compiled to use PAM and with PEGASUS_USE_PAM_STANDALONE_PROC defined, as used in VMWare ESX Server 3.0.1 and 3.0.2, might allow remote attackers to execute arbitrary code via vectors related to PAM authentication, a different vulnerability than CVE-2008-0003.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenPegasus | ||
VMware ESXi | =3.0.2 | |
VMware ESXi | =3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5360 is rated as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2007-5360, upgrade to the latest version of OpenPegasus Management server or apply the relevant patches provided by VMware.
CVE-2007-5360 affects OpenPegasus Management server compiled with PAM, and VMware ESX Server versions 3.0.1 and 3.0.2.
CVE-2007-5360 is a buffer overflow vulnerability that allows remote attackers to execute arbitrary code.
The potential impacts of CVE-2007-5360 include unauthorized access and execution of arbitrary commands on the affected system.