Vulnerability Details : CVE-2008-4916
Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors.
Vulnerability category: Denial of service
Products affected by CVE-2008-4916
- cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4916
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4916
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:S/C:N/I:N/A:C |
3.1
|
6.9
|
NIST |
References for CVE-2008-4916
-
http://www.securitytracker.com/id?1021973
-
http://seclists.org/fulldisclosure/2009/Apr/0036.html
-
http://www.vmware.com/security/advisories/VMSA-2009-0005.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439
-
http://lists.vmware.com/pipermail/security-announce/2009/000054.html
-
http://security.gentoo.org/glsa/glsa-201209-25.xml
VMware Player, Server, Workstation: Multiple vulnerabilities (GLSA 201209-25) — Gentoo security
-
http://www.securityfocus.com/bid/34373
-
http://www.vupen.com/english/advisories/2009/0944
Jump to