First published: Mon May 09 2011(Updated: )
Directory traversal vulnerability in vCenter Server in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, and VMware VirtualCenter 2.5 before Update 6a, allows remote attackers to read arbitrary files via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | =4.0 | |
VMware vCenter | =4.0-update_1 | |
VMware vCenter | =4.0-update_2 | |
VMware vCenter | =4.1 | |
VMware vCenter | =2.5-update_1 | |
VMware vCenter | =2.5-update_2 | |
VMware vCenter | =2.5-update_3 | |
VMware vCenter | =2.5-update_4 | |
VMware vCenter | =2.5-update_5 | |
VMware vCenter | =2.5-update_6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0426 is rated as high severity due to the potential for arbitrary file access by remote attackers.
To fix CVE-2011-0426, update VMware vCenter to the latest versions that include the necessary security patches.
CVE-2011-0426 affects VMware vCenter versions 4.0 before Update 3, 4.1 before Update 1, and VMware VirtualCenter 2.5 before Update 6a.
There are no known workarounds to mitigate CVE-2011-0426; updating to a secure version is necessary.
CVE-2011-0426 can be exploited through a directory traversal attack, allowing attackers to read unauthorized files on the server.