CVE-2008-3892

N/A Unknown
Published: September 03, 2008 Modified: April 23, 2026
View on NVD

Description

Buffer overflow in a certain ActiveX control in the COM API in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a call to the GuestInfo method in which there is a long string argument, and an assignment of a long string value to the result of this call. NOTE: this may overlap CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, or CVE-2008-3696.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31707
Source: cve@mitre.org
Patch Third Party Advisory
http://secunia.com/advisories/31708
Source: cve@mitre.org
Patch Third Party Advisory
http://secunia.com/advisories/31709
Source: cve@mitre.org
Patch Third Party Advisory
http://secunia.com/advisories/31710
Source: cve@mitre.org
Patch Third Party Advisory
http://securityreason.com/securityalert/4202
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29503
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30934
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2466
Source: cve@mitre.org
Third Party Advisory
https://www.exploit-db.com/exploits/6345
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/31707
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://secunia.com/advisories/31708
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://secunia.com/advisories/31709
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://secunia.com/advisories/31710
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://securityreason.com/securityalert/4202
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/495869/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29503
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30934
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vmware.com/support/ace/doc/releasenotes_ace.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vmware.com/support/player/doc/releasenotes_player.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vmware.com/support/server/doc/releasenotes_server.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2466
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/43062
Source: af854a3a-2127-422b-91ae-364da2661108
VDB Entry
https://www.exploit-db.com/exploits/6345
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

vmware