First published: Tue Dec 09 2008(Updated: )
Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | =3.5 | |
VMware Workstation | >=5.5<=5.5.8 | |
VMware Workstation | >=6.0<=6.0.5 | |
VMware Player | >=1.0.0<=1.0.8 | |
VMware Player | >=2.0<=2.0.5 | |
VMware Server | >=1.0<=1.0.9 | |
VMware ESXi | >=3.0.2<=3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4917 is considered to be a high severity vulnerability affecting multiple VMware products.
To address CVE-2008-4917, it is recommended to upgrade to the latest patched versions of the affected VMware products.
CVE-2008-4917 affects VMware Workstation, Player, Server, ESXi, and ESX versions specified in the vulnerability details.
Yes, CVE-2008-4917 may allow guest OS users to gain unauthorized access to the host system.
While a permanent solution is to upgrade, disabling problematic features may serve as a temporary workaround for CVE-2008-4917.