First published: Mon Apr 06 2009(Updated: )
VI Client in VMware VirtualCenter before 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =3.5 | |
VMware vCenter | =1.4.1 | |
VMware vCenter | =1.3.1 | |
VMware vCenter | =1.1 | |
VMware vCenter | =1.4 | |
VMware vCenter | =1.2 | |
VMware ESXi | =3.5 | |
VMware vCenter | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0518 has a medium severity rating due to the potential for local users to access sensitive information.
To fix CVE-2009-0518, upgrade to VMware VirtualCenter 2.5 Update 4, or VMware ESXi and ESX 3.5 Update 4 or later.
CVE-2009-0518 affects users of VMware VirtualCenter versions 1.1 through 1.4.1 and VMware ESXi and ESX versions 3.5 prior to Update 4.
CVE-2009-0518 is a local information disclosure vulnerability that allows exposure of sensitive passwords.
CVE-2009-0518 was reported in April 2009.