First published: Mon Dec 23 2013(Updated: )
VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 | |
VMware ESXi | =5.0-1 | |
VMware ESXi | =5.0-2 | |
VMware ESXi | =5.1 | |
VMware ESXi | =5.1-1 | |
VMware ESXi | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5973 is rated as a moderate severity vulnerability.
To fix CVE-2013-5973, upgrade to a patched version of VMware ESXi or ESX that resolves this issue.
CVE-2013-5973 affects VMware ESXi versions 4.0 through 5.5 and ESX versions 4.0 and 4.1.
CVE-2013-5973 allows local users to read or modify arbitrary files including those with -flat, -rdm, or -rdmp filenames.
CVE-2013-5973 can be exploited by local users with the Virtual Machine Power User or Resource Pool Administrator role.