CVE-2013-1661
Published Sep 4, 2013
Last updated 11 years ago
Overview
- Description
- VMware ESXi 4.0 through 5.1, and ESX 4.0 and 4.1, does not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to cause a denial of service (unhandled exception and application crash) by modifying the client-server data stream.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE" }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00" } ], "operator": "OR" } ] } ]