複数の VMware 製品における任意のコードを実行される脆弱性
| Title |
複数の VMware 製品における任意のコードを実行される脆弱性
|
| Summary |
複数の VMware 製品は、Network File Copy (NFC) プロトコルを適切に実装しないため、任意のコードを実行される、またはサービス運用妨害 (メモリ破損) 状態となる脆弱性が存在します。
|
| Possible impacts |
中間者攻撃 (man-in-the-middle attack) により、クライアント・サーバ間のデータストリームを改ざんされることで、任意のコードを実行される、またはサービス運用妨害 (メモリ破損) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Feb. 21, 2013, midnight |
| Registration Date |
Feb. 26, 2013, 3:37 p.m. |
| Last Update |
Feb. 26, 2013, 3:37 p.m. |
|
CVSS2.0 : 危険
|
| Score |
7.6
|
| Vector |
AV:N/AC:H/Au:N/C:C/I:C/A:C |
Affected System
| VMware |
|
VMware ESX 3.5 から 4.1
|
|
VMware ESXi 3.5 から 5.1
|
|
VMware vCenter Server 5.1.0b 未満の 5.1
|
|
VMware vCenter Server Update 2 未満の 5.0
|
|
VMware vCenter Server Update 4b 未満の 4.0
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2013年02月26日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2013-1659
| Summary |
VMware vCenter Server 4.0 before Update 4b, 5.0 before Update 2, and 5.1 before 5.1.0b; VMware ESXi 3.5 through 5.1; and VMware ESX 3.5 through 4.1 do not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption) by modifying the client-server data stream.
|
| Publication Date |
Feb. 23, 2013, 5:55 a.m. |
| Registration Date |
Jan. 26, 2021, 3:36 p.m. |
| Last Update |
Nov. 21, 2024, 10:50 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vcenter_server:4.0:update_4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:4.0:update_3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:4.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:4.0:update_1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:4.0:update_4a:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:4.0:update_2:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server_appliance:5.1.0a:*:*:*:*:*:*:* |
|
|
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:vmware:vcenter_server:5.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:vmware:vcenter_server:5.0:update_1:*:*:*:*:*:* |
|
|
|
|
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:* |
|
|
|
|
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List