First published: Tue Sep 10 2013(Updated: )
Directory traversal vulnerability in VMware ESXi 4.0 through 5.0, and ESX 4.0 and 4.1, allows remote attackers to delete arbitrary host OS files via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3658 is classified as a critical vulnerability due to the potential for remote attackers to delete arbitrary host OS files.
To mitigate CVE-2013-3658, upgrade to the latest patched version of VMware ESXi or ESX that addresses this vulnerability.
CVE-2013-3658 affects VMware ESXi versions 4.0 through 5.0 and VMware ESX versions 4.0 and 4.1.
Exploitation of CVE-2013-3658 could allow attackers to perform unauthorized file deletions on the host operating system.
There are no specific workarounds for CVE-2013-3658; the recommended action is to update to a secure version.