Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-2267

EPSS 2.55% · P86
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-2267

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
VMware PF异常本地权限提升漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMWare是一款“虚拟PC”软件,允许在一台机器上同时运行两个或多个Windows、DOS、LINUX系统。 VMware 存在本地权限提升漏洞。当处理器出现#PF异常时,会向包含有标记的栈上Push一个异常代码,操作系统使用这个标记确定正确地操作阶段。其中的一个标记为U/S(user/supervisor),当处理器处于用户态时出现错误会设置这个标记。 在Virtual-8086模式中,当VMWare模拟far调用或far jmp指令时,错误的使用了管理访问push栈上的返回cs和ip,导致向gues
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-2267

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-2267

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-11-02 · 20 CVEs total

CVE-2009-3635TYPO3 安装工具组件身份认证漏洞
CVE-2009-3839Sun Solaris Trusted Extensions Policy配置远程权限提升漏洞
CVE-2009-3838Pegasus Mail POP3响应处理栈溢出漏洞
CVE-2009-3837Eureka Email POP3栈缓冲区溢出漏洞
CVE-2009-3836Aruba Mobility Controller 802.11关联请求帧远程拒绝服务漏洞
CVE-2009-3835Whorl_Ltd Jshop 'pid'参数SQL 注入漏洞
CVE-2009-3834Webguerilla Photoblog 'category'参数SQL注入漏洞
CVE-2009-3833tftgallery "index.php" 跨站脚本攻击漏洞
CVE-2009-3733VMware Products 目录遍历漏洞
CVE-2009-3636TYPO3 安装工具跨站脚本漏洞
CVE-2009-3605Freedesktop Poppler 数字错误漏洞
CVE-2009-3634TYPO3 子组件"Frontend Login Box" 跨站脚本漏洞
CVE-2009-3633TYPO3 API函数"t3lib_div::quoteJSvalue" 跨站脚本漏洞
CVE-2009-3632TYPO3 前端编辑特性SQL注入漏洞
CVE-2009-3631TYPO3 文件上传命令执行漏洞
CVE-2009-3630TYPO3 子组件"Backend" 框架劫持漏洞
CVE-2009-3629TYPO3 多个跨站脚本攻击漏洞
CVE-2009-3628TYPO3核多个安全漏洞
CVE-2009-3624Linux kernel 加密问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2009-2267

No comments yet


Leave a comment