CVE-2013-5973
Published Dec 23, 2013
Last updated 6 years ago
Overview
- Description
- VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE" }, { "criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A4E41C0-31FA-47AA-A9BF-B9A6C1D44801" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF016EE7-083A-4D62-A6D4-2807EB47B6DB" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F11844A-3C6C-4AA5-87DC-979AFF62867A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC463653-A599-45CF-8EA9-8854D5C59963" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC5C2BF-6EC6-436F-A925-469E87249C8A" }, { "criteria": "cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BCE5DA9-BB88-4169-B77C-40B1F98D511A" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2331236-2E9B-4B52-81EE-B52DEB41ACE5" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5A1C2B-119E-49F3-B8E6-0610EE1C445C" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF29B5A4-6E4C-4EAE-BC6A-0DD44262EE35" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7217CBE1-3882-4045-A15C-EE7D4174CA00" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9A405802-D786-46F9-9E29-C727F9FD480A" }, { "criteria": "cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "469D98A5-7B8B-41BE-94C6-D6EF25388007" } ], "operator": "OR" } ] } ]