Published:2013/12/24  Last Updated:2013/12/24

VMware ESX and ESXi may allow access to arbitrary files


VMware ESX and ESXi contain a vulnerability in the handling of Virtual Machine file descriptors.

Products Affected

  • VMware ESXi 5.5 without patch ESXi550-201312001
  • VMware ESXi 5.1 without patch ESXi510-201310001
  • VMware ESXi 5.0 without patch update-from-esxi5.0-5.0_update03
  • VMware ESXi 4.1 without patch ESXi410-201312001
  • VMware ESXi 4.0 without patch ESXi400-201310001
  • VMware ESX 4.1 without patch ESX410-201312001
  • VMware ESX 4.0 without patch ESX400-201310001


VMware ESX and ESXi contain a vulnerability in the handling of Virtual Machine file descriptors, which may allow access to arbitrary ESX and ESXi files.


Users that have privileges to execute "Add New Disk" or "Add Existing Disk" in vCenter Server may obtain read and write access to arbitrary ESX and ESXi files.

According to the developer, this issue cannot be exploited through VMware vCloud Director.


Apply a patch
Apply the appropriate patch according to the information provided by the developer.


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2013.12.24

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication login caused to be created by an administrator
  • Low-Mid
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures


Shanon Olsson reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2013-5973
JVN iPedia JVNDB-2013-000123