First published: Thu Jun 05 2008(Updated: )
Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =3.5 | |
VMware ESXi | =3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2097 is classified as a critical vulnerability due to the potential for remote authenticated users to gain elevated privileges.
To remediate CVE-2008-2097, it is recommended to update VMware ESXi and ESX to the latest versions that address this vulnerability.
CVE-2008-2097 affects users of VMware ESXi and ESX versions 3.5.
CVE-2008-2097 is a buffer overflow vulnerability that can be exploited by sending an invalid Content-Length request.
Yes, CVE-2008-2097 can be exploited remotely by authenticated users.