CVE-2013-1659
Published Feb 22, 2013
Last updated 12 years ago
Overview
- Description
- VMware vCenter Server 4.0 before Update 4b, 5.0 before Update 2, and 5.1 before 5.1.0b; VMware ESXi 3.5 through 5.1; and VMware ESX 3.5 through 4.1 do not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption) by modifying the client-server data stream.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.6
- Impact score
- 10
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF5E54D6-434C-4EA2-984A-CE549B959731" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64893E61-9F18-4250-AEA4-9C47BAE1D72B" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79B02F0B-0D3B-4B68-BE2D-F43C12397B0A" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:update_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A4596D4-74FD-42DD-AC38-D814A99822FB" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:update_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BDBAABE-D43C-491B-A3D2-8A625A8524E6" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:update_4a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E127819E-7DFD-4BDC-A07E-5F3D948F5915" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FECF06B5-3915-48F0-A140-41C7A27EE99D" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.1.0a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B0C9A45-9195-4BAC-AF54-DB6EA8BD3430" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46C704E0-E165-4A44-A104-6C5B83A83237" }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:5.0:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DD9571C-CF1F-4EBA-AC8F-F0DF22106FDC" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAE88D8C-9CC3-46D1-9F26-290BC679F47E" }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58ED8AB4-0FDF-4752-B44E-56F58593CE41" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAE88D8C-9CC3-46D1-9F26-290BC679F47E" }, { "criteria": "cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58ED8AB4-0FDF-4752-B44E-56F58593CE41" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D" } ], "operator": "OR" } ] } ]