First published: Wed Sep 04 2013(Updated: )
VMware ESXi 4.0 through 5.1, and ESX 4.0 and 4.1, does not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to cause a denial of service (unhandled exception and application crash) by modifying the client-server data stream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 | |
VMware ESXi | =5.0-1 | |
VMware ESXi | =5.0-2 | |
VMware ESXi | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1661 is classified as a high severity vulnerability due to its potential to cause denial of service.
To remediate CVE-2013-1661, users should update to the latest patched version of VMware ESXi or ESX as recommended by VMware security advisories.
CVE-2013-1661 affects VMware ESXi versions 4.0 through 5.1 and ESX versions 4.0 and 4.1.
CVE-2013-1661 allows man-in-the-middle attackers to modify the client-server data stream, potentially leading to application crashes.
Yes, CVE-2013-1661 can be exploited remotely if an attacker is able to position themselves in the data stream between the client and server.