First published: Tue Feb 26 2008(Updated: )
Directory traversal vulnerability in the Shared Folders feature for VMWare ACE 1.0.2 and 2.0.2, Player 1.0.4 and 2.0.2, and Workstation 5.5.4 and 6.0.2 allows guest OS users to read and write arbitrary files on the host OS via a multibyte string that produces a wide character string containing .. (dot dot) sequences, which bypasses the protection mechanism, as demonstrated using a "%c0%2e%c0%2e" string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Player | =1.0.3 | |
VMware ACE | =1.0 | |
VMware Player | =1.0.2 | |
VMware ACE | =2.0.2 | |
VMware ACE | =2.0 | |
VMware ACE | =2.0.1 | |
VMware ACE | =1.0.2 | |
VMware Workstation | =6.0 | |
VMware Workstation | =5.5.3_build_34685 | |
VMware Player | =1.0.1_build_19317 | |
VMware Player | =1.0.4 | |
VMware VMware Workstation | =6.0.2 | |
VMware VMware Workstation | =6.0.1 | |
VMware Workstation | =5.5.4 | |
VMware Workstation | =4.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0923 has a moderate severity rating due to its ability to allow guest OS users to access arbitrary files on the host OS.
To fix CVE-2008-0923, users should upgrade to the latest versions of affected VMware products that include the necessary patches.
CVE-2008-0923 affects VMware ACE 1.0.2 and 2.0.2, Player 1.0.4 and 2.0.2, and Workstation 5.5.4 and 6.0.2.
A directory traversal vulnerability in CVE-2008-0923 allows unauthorized access to files on the host OS by manipulating file paths.
CVE-2008-0923 can be exploited by a user on the guest OS to access sensitive data on the host OS, highlighting its security risk.