[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-5973Date: (C)2013-12-27   (M)2023-12-22


VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.4
Exploit Score: 3.4
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
OSVDB-101387
SECTRACK-1029529
http://www.securityfocus.com/archive/1/530482/100/0/threaded
BID-64491
JVN#13154935
JVNDB-2013-000123
http://www.vmware.com/security/advisories/VMSA-2013-0016.html
vmware-esx-esxi-cve20135973-sec-bypass(89938)

CPE    16
cpe:/o:vmware:esxi:4.1:1
cpe:/o:vmware:esxi:4.0:2
cpe:/o:vmware:esxi:4.0:1
cpe:/o:vmware:esxi:4.0:4
...
CWE    1
CWE-264

© SecPod Technologies