First published: Sat Nov 19 2011(Updated: )
The default configuration of the HTTP server in Jetty in vSphere Update Manager in VMware vCenter Update Manager 4.0 before Update 4 and 4.1 before Update 2 allows remote attackers to conduct directory traversal attacks and read arbitrary files via unspecified vectors, a related issue to CVE-2009-1523.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter Update Manager | =4.1-update_1 | |
VMware vCenter Update Manager | =4.0-update_2 | |
VMware vCenter Update Manager | =4.1 | |
VMware vCenter Update Manager | =4.0-update_1 | |
VMware vCenter Update Manager | =4.0-update_3 | |
VMware vCenter Update Manager | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4404 is considered a medium severity vulnerability due to its potential for directory traversal attacks allowing unauthorized file access.
To fix CVE-2011-4404, you should update VMware vCenter Update Manager to at least version 4.1 Update 2 or 4.0 Update 4.
CVE-2011-4404 affects VMware vCenter Update Manager versions 4.0 Update 1, 4.0 Update 2, 4.0 Update 3, and 4.1.
CVE-2011-4404 can be exploited through directory traversal techniques to read arbitrary files from the server.
While updating is the recommended fix for CVE-2011-4404, restricting access to the HTTP server can mitigate the risk.