Search for vulnerabilities
Vulnerability details: VCID-ysde-9ngt-aaag
Vulnerability ID VCID-ysde-9ngt-aaag
Aliases CVE-2009-2267
Summary VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.02599 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
epss 0.03225 https://api.first.org/data/v1/epss?cve=CVE-2009-2267
cvssv2 6.9 https://nvd.nist.gov/vuln/detail/CVE-2009-2267
Reference id Reference type URL
http://lists.vmware.com/pipermail/security-announce/2009/000069.html
https://api.first.org/data/v1/epss?cve=CVE-2009-2267
http://secunia.com/advisories/37172
http://security.gentoo.org/glsa/glsa-201209-25.xml
http://securitytracker.com/id?1023082
http://securitytracker.com/id?1023083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8473
http://www.securityfocus.com/archive/1/507523/100/0/threaded
http://www.securityfocus.com/archive/1/507539/100/0/threaded
http://www.securityfocus.com/bid/36841
http://www.vmware.com/security/advisories/VMSA-2009-0015.html
http://www.vupen.com/english/advisories/2009/3062
cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:2.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:2.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
CVE-2009-2267 https://nvd.nist.gov/vuln/detail/CVE-2009-2267
CVE-2009-2267;OSVDB-59441 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt
GLSA-201209-25 https://security.gentoo.org/glsa/201209-25
Data source Exploit-DB
Date added Oct. 26, 2009
Description VMware Virtual 8086 - Linux Local Ring0
Ransomware campaign use Known
Source publication date Oct. 27, 2009
Exploit type local
Platform multiple
Source update date July 14, 2017
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2009-2267
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.49748
EPSS Score 0.00135
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.