CVE-2008-4279

N/A Unknown
Published: October 06, 2008 Modified: April 23, 2026
View on NVD

Description

The CPU hardware emulation for 64-bit guest operating systems in VMware Workstation 6.0.x before 6.0.5 build 109488 and 5.x before 5.5.8 build 108000; Player 2.0.x before 2.0.5 build 109488 and 1.x before 1.0.8; Server 1.x before 1.0.7 build 108231; and ESX 2.5.4 through 3.5 allows authenticated guest OS users to gain additional guest OS privileges by triggering an exception that causes the virtual CPU to perform an indirect jump to a non-canonical address.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=122331139823057&w=2
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/32157
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/32179
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/32180
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/archive/1/497041/100/0/threaded
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31569
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020991
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0016.html
Source: cve@mitre.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/2740
Source: cve@mitre.org
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45668
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://lists.grok.org.uk/pipermail/full-disclosure/2008-October/064860.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=122331139823057&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/32157
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/32179
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/32180
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/497041/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31569
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020991
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2008/2740
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/45668
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5929
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
21th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

vmware