VMware ESX Server / ESXi Virtual Machine File Descriptors Security Bypass Vulnerability
RISK: Medium Risk
TYPE: Operating Systems - VM Ware
A vulnerability has been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to bypass certain security restrictions.
The vulnerability is caused due to an error when handling certain Virtual Machine file descriptors, which can be exploited to gain read and write access to otherwise restricted, arbitrary files and potentially execute arbitrary code on a host after a reboot.
Successful exploitation requires the "Add Existing Disk" privilege via the e.g. VCenter Server permissions "Virtual Machine Power User" or "Resource Pool Administrator".
Note: Additionally this can be exploited by malicious, local users to gain read and write access to otherwise restricted, arbitrary files.
Impact
- Security Restriction Bypass
System / Technologies affected
- VMware ESX Server versions 4.0 and 4.1 and VMware ESXi versions 4.0, 4.1, 5.0, 5.1, and 5.5.
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Apply patches.
Vulnerability Identifier
Source
Related Link
Share with