7.5
CVSSv2

CVE-2008-2234

Published: 18/08/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in Openwsman 1.2.0 and 2.0.0 allow remote malicious users to execute arbitrary code via a crafted "Authorization: Basic" HTTP header.

Vulnerable Product Search on Vulmon Subscribe to Product

openwsman openwsman 1.2.0

openwsman openwsman 2.0.0

Recent Articles

VMware patches remote execution vulns
The Register • Dan Goodin • 19 Sep 2008

Closing openwsman

VMware has fixed critical security bugs in two of its virtualization products that could allow a remote attacker to remotely install malware on a host machine. The patches, which apply to ESXi and ESX 3.5, fix two buffer overflow bugs that reside in a component known as openwsman. It provides web services management functionality and is enabled by default. The vulnerabilities could be exploited by people without login credentials to the system, VMware warns here. VMware went on to say the bug ca...