VMware ESX and ESXi may allow access to arbitrary files


VMware ESX and ESXi contain a vulnerability in the handling of Virtual Machine file descriptors, which may allow access to arbitrary ESX and ESXi files.

Shanon Olsson reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 2.1 (Low) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None

Affected Products

  • VMware ESX 4.0 without patch ESX400-201310001
  • VMware ESX 4.1 without patch ESX410-201312001
  • VMware ESXi 4.0 without patch ESXi400-201310001
  • VMware ESXi 4.1 without patch ESXi410-201312001
  • VMware ESXi 5.0 without patch update-from-esxi5.0-5.0_update03
  • VMware ESXi 5.1 without patch ESXi510-201310001
  • VMware ESXi 5.5 without patch ESXi550-201312001


Users that have privileges to execute "Add New Disk" or "Add Existing Disk" in vCenter Server may obtain read and write access to arbitrary ESX and ESXi files.

According to the developer, this issue cannot be exploited through VMware vCloud Director.

[Apply a patch]
Apply the appropriate patch according to the information provided by the developer.
Vendor Information

CWE (What is CWE?)

  1. No Mapping(CWE-noinfo) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2013-5973

  1. JVN : JVN#13154935
  2. National Vulnerability Database (NVD) : CVE-2013-5973
Revision History

  Web page was published
  References : Content was added