Unrated severityNVD Advisory· Published Jun 1, 2009· Updated Apr 23, 2026
CVE-2009-1805
CVE-2009-1805
Description
Unspecified vulnerability in the VMware Descheduled Time Accounting driver in VMware Workstation 6.5.1 and earlier, VMware Player 2.5.1 and earlier, VMware ACE 2.5.1 and earlier, VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745, VMware Fusion 2.x before 2.0.2 build 147997, VMware ESXi 3.5, and VMware ESX 3.0.2, 3.0.3, and 3.5, when the Descheduled Time Accounting Service is not running, allows guest OS users on Windows to cause a denial of service via unknown vectors.
Affected products
101cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*+ 18 more
- cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*range: <=2.5.1
- cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.3_build_54075:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0.1_build_55017:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*range: <=2.5.1
- cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*range: <=1.0.8
- cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.4_build_56528:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*+ 46 more
- cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*range: <=6.5.1
- cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:3.2.1:patch1:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.0.1_build_5289:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.5.2_build_8848:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:4.5.2_build_8848:r4:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.0.0_build_13124:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.0_build_13124:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.1_build_19175:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.3:42958:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.3_build_42958:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.4_build_44386:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.5_build_56455:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:5.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0.1_build_55017:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:6.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.vmware.com/security/advisories/VMSA-2009-0007.htmlnvdPatch
- secunia.com/advisories/35269nvdVendor Advisory
- www.securityfocus.com/archive/1/503912/100/0/threadednvd
- www.securityfocus.com/bid/35141nvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2009/1452nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6130nvd
News mentions
0No linked articles in our index yet.