First published: Sat Dec 31 2005(Updated: )
The configuration of VMware ESX Server 2.x, 2.0.x, 2.1.x, and 2.5.x allows local users to cause a denial of service (shutdown) via the (1) halt, (2) poweroff, and (3) reboot scripts executed at the service console.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | =1.5.2-patch3 | |
VMware ESXi | <=2.5.2 | |
VMware ESXi | =2.0 | |
VMware ESXi | =2.0.1 | |
VMware ESXi | =2.1.2 | |
VMware ESXi | =2.5 | |
VMware ESXi | =1.5.2-patch1 | |
VMware ESXi | =2.1.1 | |
VMware ESXi | =1.5.2-patch2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4773 has a high severity rating due to its potential to cause a denial of service through local user actions.
CVE-2005-4773 allows local users to execute scripts that can shut down the VMware ESX Server, disrupting services.
CVE-2005-4773 affects users of VMware ESX Server versions 2.x, including 2.0.x, 2.1.x, and 2.5.x as well as specific versions of 1.5.2.
Mitigation for CVE-2005-4773 can be achieved by restricting access to the service console and controlling user permissions.
No specific patch is mentioned for CVE-2005-4773, but upgrading to a non-vulnerable version of VMware ESX is recommended.