First published: Mon Jul 31 2006(Updated: )
VMware ESX Server 2.0.x before 2.0.2 and 2.x before 2.5.2 patch 4 stores authentication credentials in base 64 encoded format in the vmware.mui.kid and vmware.mui.sid cookies, which allows attackers to gain privileges by obtaining the cookies using attacks such as cross-site scripting (CVE-2005-3619).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =2.0 | |
VMware ESX | =2.0.1 | |
VMware ESX | =2.1.2 | |
VMware ESX | =2.5 | |
VMware ESX | =2.5.2 | |
VMware ESX | =2.1.1 | |
VMware ESX | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2481 has a moderate severity rating due to the potential for privilege escalation when authentication cookies are intercepted.
To fix CVE-2006-2481, upgrade VMware ESX Server to version 2.0.2 or later, or to 2.5.2 patch 4 or later.
CVE-2006-2481 affects VMware ESX versions 2.0 to 2.5, specifically 2.0, 2.0.1, 2.1, 2.1.1, 2.1.2, 2.5, and 2.5.2 before patch 4.
Attackers can exploit CVE-2006-2481 through methods such as cross-site scripting to gain access to sensitive authentication cookies.
CVE-2006-2481 can lead to unauthorized access and privilege escalation, compromising the security of a VMware ESX environment.