Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.103662
Kategorie:VMware Local Security Checks
Titel:VMware ESXi/ESX VMCI privilege escalation vulnerability (VMSA-2013-0002)
Zusammenfassung:The remote ESXi is missing one or more security related Updates from VMSA-2013-0002.
Beschreibung:Summary:
The remote ESXi is missing one or more security related Updates from VMSA-2013-0002.

Vulnerability Insight:
a. VMware VMCI privilege escalation

VMware ESX, Workstation, Fusion, and View contain a vulnerability in the
handling of control code in vmci.sys. A local malicious user may exploit this
vulnerability to manipulate the memory allocation through the Virtual Machine
Communication Interface (VMCI) code. This could result in a privilege escalation
on Windows-based hosts and on Windows-based Guest Operating Systems.

The vulnerability does not allow for privilege escalation from the Guest
Operating System to the host (and vice versa). This means that host memory can
not be manipulated from the Guest Operating System (and vice versa).

Systems that have VMCI disabled are also affected by this issue.

Affected Software/OS:
VMware ESXi 5.1 without ESXi510-201212102-SG

VMware ESXi 5.0 without ESXi500-201212102-SG

VMware ESXi 4.1.without ESXi410-201211402-BG

VMware ESXi 4.0 without ESXi400-201302402-SG

VMware ESX 4.1.without ESX410-201211401-SG

VMware ESX 4.0 without ESX400-201302401-SG

Solution:
Apply the missing patch(es).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-1406
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164
CopyrightCopyright (C) 2013 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.