Skip to main content

VMware ESX Server / ESXi Virtual Machine File Descriptors Security Bypass Vulnerability

Last Update Date: 24 Dec 2013 11:51 Release Date: 24 Dec 2013 3427 Views

RISK: Medium Risk

TYPE: Operating Systems - VM Ware

TYPE: VM Ware

A vulnerability has been identified in VMware ESX Server and VMware ESXi, which can be exploited by malicious users to bypass certain security restrictions.

 

The vulnerability is caused due to an error when handling certain Virtual Machine file descriptors, which can be exploited to gain read and write access to otherwise restricted, arbitrary files and potentially execute arbitrary code on a host after a reboot.

 

Successful exploitation requires the "Add Existing Disk" privilege via the e.g. VCenter Server permissions "Virtual Machine Power User" or "Resource Pool Administrator".

 

Note: Additionally this can be exploited by malicious, local users to gain read and write access to otherwise restricted, arbitrary files.


Impact

  • Security Restriction Bypass

System / Technologies affected

  • VMware ESX Server versions 4.0 and 4.1 and VMware ESXi versions 4.0, 4.1, 5.0, 5.1, and 5.5.

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Apply patches.

Vulnerability Identifier


Source


Related Link