CVE-2011-2217
Summary
| CVE | CVE-2011-2217 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2011-06-06 19:55:00 UTC |
| Updated | 2017-08-29 01:29:00 UTC |
| Description | Certain ActiveX controls in (1) tsgetxu71ex552.dll and (2) tsgetx71ex552.dll in Tom Sawyer GET Extension Factory 5.5.2.237, as used in VI Client (aka VMware Infrastructure Client) 2.0.2 before Build 230598 and 2.5 before Build 204931 in VMware Infrastructure 3, do not properly handle attempted initialization within Internet Explorer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Tomsawyer | Get Extension Factory | 5.5.2.237 | All | All | All |
| Application | Tomsawyer | Get Extension Factory | 5.5.2.237 | All | All | All |
| Application | Vmware | Infrastructure | 3 | All | All | All |
| Application | Vmware | Infrastructure | 3 | All | All | All |
| Application | Vmware | Virtual Infrastructure Client | 2.0.2 | All | All | All |
| Application | Vmware | Virtual Infrastructure Client | 2.5 | All | All | All |
| Application | Vmware | Virtual Infrastructure Client | 2.0.2 | All | All | All |
| Application | Vmware | Virtual Infrastructure Client | 2.5 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Tom Sawyer Software GET Extension Factory Object Initialization Memory Corruption Vulnerability | BID | www.securityfocus.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| VMSA-2011-0009.3 | CONFIRM | www.vmware.com | Vendor Advisory |
| iDefense Security Intelligence Services - Information Security Services - Verisign | IDEFENSE | labs.idefense.com | |
| Tom Sawyer GET Extension Factory Object Instantiation Memory Corruption Vulnerability - Secunia.com | SECUNIA | secunia.com | |
| VMware Products VI Client ActiveX Control Memory Corruption Vulnerability - Advisories - Community | SECUNIA | secunia.com | Vendor Advisory |
| VMware VI Client ActiveX Control Lets Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.