Published:2013/12/24  Last Updated:2013/12/24

JVN#13154935
VMware ESX and ESXi may allow access to arbitrary files

Overview

VMware ESX and ESXi contain a vulnerability in the handling of Virtual Machine file descriptors.

Products Affected

  • VMware ESXi 5.5 without patch ESXi550-201312001
  • VMware ESXi 5.1 without patch ESXi510-201310001
  • VMware ESXi 5.0 without patch update-from-esxi5.0-5.0_update03
  • VMware ESXi 4.1 without patch ESXi410-201312001
  • VMware ESXi 4.0 without patch ESXi400-201310001
  • VMware ESX 4.1 without patch ESX410-201312001
  • VMware ESX 4.0 without patch ESX400-201310001

Description

VMware ESX and ESXi contain a vulnerability in the handling of Virtual Machine file descriptors, which may allow access to arbitrary ESX and ESXi files.

Impact

Users that have privileges to execute "Add New Disk" or "Add Existing Disk" in vCenter Server may obtain read and write access to arbitrary ESX and ESXi files.

According to the developer, this issue cannot be exploited through VMware vCloud Director.

Solution

Apply a patch
Apply the appropriate patch according to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2013.12.24

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication login caused to be created by an administrator
  • Low-Mid
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures

Credit

Shanon Olsson reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2013-5973
JVN iPedia JVNDB-2013-000123