First published: Fri Feb 22 2013(Updated: )
VMware vCenter Server 4.1 before Update 3 and 5.0 before Update 2, and vCSA 5.0 before Update 2, allows remote attackers to cause a denial of service (disk consumption) via vectors that trigger large log entries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | =4.1 | |
VMware vCenter | =4.1-update_1 | |
VMware vCenter | =4.1-update_2 | |
VMware vCenter | =5.0 | |
VMware vCenter | =5.0-beta | |
VMware vCenter | =5.0-update_1 | |
VMware vCenter | =5.0-update_2_rc | |
VMware vCenter Server Appliance | =5.0 | |
VMware vCenter Server Appliance | =5.0-update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6326 has a medium severity rating as it can lead to a denial of service due to disk consumption.
To fix CVE-2012-6326, you need to apply the updates provided by VMware for vCenter Server versions 4.1 after Update 3 and 5.0 after Update 2.
CVE-2012-6326 affects VMware vCenter Server 4.1 before Update 3 and 5.0 before Update 2, as well as vCSA 5.0 before Update 2.
The nature of the vulnerability in CVE-2012-6326 is that remote attackers can generate large log entries, leading to disk consumption and potential denial of service.
There is no official workaround for CVE-2012-6326, and updating to the fixed versions is recommended.