[Japanese]

JVNDB-2013-000123

VMware ESX and ESXi may allow access to arbitrary files

Overview

VMware ESX and ESXi contain a vulnerability in the handling of Virtual Machine file descriptors, which may allow access to arbitrary ESX and ESXi files.

Shanon Olsson reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 2.1 (Low) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None

Affected Products


VMware
  • VMware ESX 4.0 without patch ESX400-201310001
  • VMware ESX 4.1 without patch ESX410-201312001
  • VMware ESXi 4.0 without patch ESXi400-201310001
  • VMware ESXi 4.1 without patch ESXi410-201312001
  • VMware ESXi 5.0 without patch update-from-esxi5.0-5.0_update03
  • VMware ESXi 5.1 without patch ESXi510-201310001
  • VMware ESXi 5.5 without patch ESXi550-201312001

Impact

Users that have privileges to execute "Add New Disk" or "Add Existing Disk" in vCenter Server may obtain read and write access to arbitrary ESX and ESXi files.

According to the developer, this issue cannot be exploited through VMware vCloud Director.
Solution

[Apply a patch]
Apply the appropriate patch according to the information provided by the developer.
Vendor Information

VMware
CWE (What is CWE?)

  1. No Mapping(CWE-noinfo) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2013-5973
References

  1. JVN : JVN#13154935
  2. National Vulnerability Database (NVD) : CVE-2013-5973
Revision History

[2013/12/24]
  Web page was published
[2013/12/25]
  References : Content was added