Vulnerability Description
VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Esx | 4.0 |
| Vmware | Esxi | 4.0 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN13154935/index.html
- http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000123.html
- http://osvdb.org/101387
- http://www.securityfocus.com/archive/1/530482/100/0/threaded
- http://www.securityfocus.com/bid/64491
- http://www.securitytracker.com/id/1029529
- http://www.vmware.com/security/advisories/VMSA-2013-0016.htmlVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89938
- http://jvn.jp/en/jp/JVN13154935/index.html
- http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000123.html
- http://osvdb.org/101387
- http://www.securityfocus.com/archive/1/530482/100/0/threaded
- http://www.securityfocus.com/bid/64491
- http://www.securitytracker.com/id/1029529
- http://www.vmware.com/security/advisories/VMSA-2013-0016.htmlVendor Advisory
FAQ
What is CVE-2013-5973?
CVE-2013-5973 is a vulnerability with a CVSS score of 4.4 (MEDIUM). VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Serve...
How severe is CVE-2013-5973?
CVE-2013-5973 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5973?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Esx, Vmware Esxi.