CVE-2005-4459

N/A Unknown
Published: December 21, 2005 Modified: April 16, 2026
View on NVD

Description

Heap-based buffer overflow in the NAT networking components vmnat.exe and vmnet-natd in VMWare Workstation 5.5, GSX Server 3.2, ACE 1.0.1, and Player 1.0 allows remote authenticated attackers, including guests, to execute arbitrary code via crafted (1) EPRT and (2) PORT FTP commands.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/18162
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/18344
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/856689
Source: cve@mitre.org
US Government Resource
http://www.securityfocus.com/bid/15998
Source: cve@mitre.org
Patch
http://www.vupen.com/english/advisories/2005/3013
Source: cve@mitre.org
Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040442.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/18162
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18344
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/282
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/289
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015401
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200601-04.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/856689
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securityfocus.com/archive/1/419997/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/420017/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15998
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vupen.com/english/advisories/2005/3013
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
63.4%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

vmware