First published: Tue Sep 10 2013(Updated: )
Buffer overflow in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3657 has a critical severity level as it allows remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2013-3657, update your VMware ESXi or ESX to the latest patched version provided by VMware.
CVE-2013-3657 affects VMware ESXi versions 4.0 through 5.0 and ESX versions 4.0 and 4.1.
The potential risks of CVE-2013-3657 include unauthorized remote code execution and service disruption.
There have been indications that CVE-2013-3657 may be under active exploit, so it is important to apply mitigations immediately.