複数の VMware 製品における任意のコードを実行される脆弱性
| Title |
複数の VMware 製品における任意のコードを実行される脆弱性
|
| Summary |
複数の VMware 製品は、管理認証プロトコルを適切に実装していないため、任意のコードを実行される、またはサービス運用妨害 (メモリ破損) 状態となる脆弱性が存在します。
|
| Possible impacts |
リモートサーバにより、任意のコードを実行される、またはサービス運用妨害 (メモリ破損) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Jan. 31, 2013, midnight |
| Registration Date |
Feb. 18, 2013, 4:11 p.m. |
| Last Update |
Feb. 18, 2013, 4:11 p.m. |
|
CVSS2.0 : 危険
|
| Score |
10
|
| Vector |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| VMware |
|
VMware ESX 3.5 から 4.1
|
|
VMware ESXi 3.5 から 4.1
|
|
VMware vCenter Server Update 3a 未満の 4.1
|
|
VMware vCenter Server Update 4b 未満の 4.0
|
|
VMware VI-Client 2.5
|
|
VMware VirtualCenter 2.5
|
|
VMware vSphere Client Update 3a 未満の 4.1
|
|
VMware vSphere Client Update 4b 未満の 4.0
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2013年02月18日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2013-1405
| Summary |
VMware vCenter Server 4.0 before Update 4b and 4.1 before Update 3a, VMware VirtualCenter 2.5, VMware vSphere Client 4.0 before Update 4b and 4.1 before Update 3a, VMware VI-Client 2.5, VMware ESXi 3.5 through 4.1, and VMware ESX 3.5 through 4.1 do not properly implement the management authentication protocol, which allow remote servers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
|
| Publication Date |
Feb. 15, 2013, 9:09 p.m. |
| Registration Date |
Jan. 26, 2021, 3:36 p.m. |
| Last Update |
Nov. 21, 2024, 10:49 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vcenter_server:4.0:update_4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:4.1:update_3:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:* |
|
|
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vsphere_client:4.0:update_4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vsphere_client:4.1:update_3:*:*:*:*:*:* |
|
|
|
|
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vi-client:2.5:*:*:*:*:*:*:* |
|
|
|
|
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:* |
|
|
|
|
| Configuration6 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List