First published: Thu Mar 20 2008(Updated: )
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation of a config.ini file located in an Application Data folder, which can be used for "hijacking the VMX process."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
VMware ACE | >=1.0<1.0.5 | |
VMware ACE | >=2.0<2.0.1 | |
VMware Player | >=1.0.0<1.0.6 | |
VMware Player | >=2.0<2.0.3 | |
VMware Server | >=1.0<1.0.5 | |
VMware Workstation | >=5.5<5.5.6 | |
VMware Workstation | >=6.0<6.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1363 is classified as a moderate severity vulnerability allowing local users to gain privileges.
To address CVE-2008-1363, upgrade VMware Workstation to version 6.0.3, Player to version 2.0.3, ACE to version 2.0.1, or Server to version 1.0.5 or later.
CVE-2008-1363 affects VMware Workstation 6.0.x before 6.0.3, 5.5.x before 5.5.6, Player 2.0.x before 2.0.3, ACE 2.0.x before 2.0.1, and Server 1.0.x before 1.0.5.
No, CVE-2008-1363 can only be exploited locally by users with access to the affected VMware applications.
CVE-2008-1363 facilitates privilege escalation, allowing local users to gain elevated privileges within the VMware environment.