Vulnerability Details : CVE-2010-4294
The frame decompression functionality in the VMnc media codec in VMware Movie Decoder before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052 and 7.x before 7.1.2 build 301548 on Windows, VMware Player 2.5.x before 2.5.5 build 246459 and 3.x before 3.1.2 build 301548 on Windows, and VMware Server 2.x on Windows does not properly validate an unspecified size field, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted video file.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-4294
Probability of exploitation activity in the next 30 days: 11.38%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-4294
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2010-4294
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-4294
-
http://lists.vmware.com/pipermail/security-announce/2010/000112.html
[Security-announce] VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues
-
http://www.securitytracker.com/id?1024819
VMware Movie Decoder Heap Overflow in Decompression Routine Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.vmware.com/security/advisories/VMSA-2010-0018.html
VMSA-2010-0018Vendor Advisory
-
http://www.securityfocus.com/bid/45169
VMware Movie Decoder VMnc Codec (CVE-2010-4294) Heap Memory Corruption Vulnerability
-
http://www.securityfocus.com/archive/1/514995/100/0/threaded
SecurityFocus
-
http://www.vupen.com/english/advisories/2010/3116
Webmail | OVH- OVHVendor Advisory
Products affected by CVE-2010-4294
- cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:movie_decoder:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:movie_decoder:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:movie_decoder:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:movie_decoder:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:movie_decoder:6.5.4:*:*:*:*:*:*:*