CVE-2013-5973

high

Description

VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/89938

http://www.vmware.com/security/advisories/VMSA-2013-0016.html

http://www.securitytracker.com/id/1029529

http://www.securityfocus.com/bid/64491

http://www.securityfocus.com/archive/1/530482/100/0/threaded

http://osvdb.org/101387

http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000123.html

http://jvn.jp/en/jp/JVN13154935/index.html

Details

Source: Mitre, NVD

Published: 2013-12-23

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 4.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Severity: High