exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2013-0016

VMware Security Advisory 2013-0016
Posted Dec 23, 2013
Authored by VMware | Site vmware.com

VMware Security Advisory 2013-0016 - VMware ESXi and ESX contain a vulnerability in the handling of certain Virtual Machine file descriptors. This issue may allow an unprivileged vCenter Server user with the privilege “Add Existing Disk" to obtain read and write access to arbitrary files on ESXi or ESX. On ESX, an unprivileged local user may obtain read and write access to arbitrary files. Modifying certain files may allow for code execution after a host reboot.

tags | advisory, arbitrary, local, code execution
advisories | CVE-2013-5973
SHA-256 | d8e6ce5b00c5f9df58de586628a8bf7d43eab978ac46b1da4ee4ede79b23472d

VMware Security Advisory 2013-0016

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2013-0016
Synopsis: VMware ESXi and ESX unauthorized file access through
vCenter Server and ESX
Issue date: 2013-12-22
Updated on: 2013-12-22 (initial advisory)
CVE numbers: CVE-2013-5973

- -----------------------------------------------------------------------

1. Summary

VMware ESXi and ESX unauthorized file access through vCenter
Server and ESX

2. Relevant releases

VMware ESXi 5.5 without patch ESXi550-201312001
VMware ESXi 5.1 without patch ESXi510-201310001
VMware ESXi 5.0 without patch update-from-esxi5.0-5.0_update03
VMware ESXi 4.1 without patch ESXi410-201312001
VMware ESXi 4.0 without patch ESXi400-201310001

VMware ESX 4.1 without patch ESX410-201312001
VMware ESX 4.0 without patch ESX400-201310001

3. Problem Description

a. VMware ESXi and ESX unauthorized file access through vCenter Server and
ESX

VMware ESXi and ESX contain a vulnerability in the handling of
certain Virtual Machine file descriptors. This issue may allow an
unprivileged vCenter Server user with the privilege “Add Existing
Disk"
to obtain read and write access to arbitrary files on ESXi or ESX.
On ESX, an unprivileged local user may obtain read and write access
to arbitrary files. Modifying certain files may allow for code
execution
after a host reboot.


Unprivileged vCenter Server users or groups that are assigned the
predefined
role "Virtual Machine Power User" or "Resource Pool Administrator"
have the
privilege "Add Existing Disk".

The issue cannot be exploited through VMware vCloud Director.

Workaround

A workaround is provided in VMware Knowledge Base article 2066856.

Mitigation

In a default vCenter Server installation no unprivileged users or
groups
are assigned the predefined role "Virtual Machine Power User" or
"Resource
Pool Administrator".

Restrict the number of vCenter Server users that have the privilege
“Add Existing Disk".

VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2013-5973 to this issue.


Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/
Product Version on Apply Patch *
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201312101-SG
ESXi 5.1 ESXi ESXi510-201310101-SG
ESXi 5.0 ESXi ESXi500-201310101-SG
ESXi 4.1 ESXi ESXi410-201312401-SG
ESXi 4.0 ESXi ESXi400-201310401-SG

ESX 4.1 ESX ESX410-201312401-SG
ESX 4.0 ESX ESX400-201310401-SG

* Known Issues

Deploying these patches does not remediate the issue if the ESXi or
ESX file /etc/vmware/configrules has been modified manually
(modifying
this file is uncommon). Customers who have modified this file should
apply the workaround after installing the patch.

After deploying the patches, Virtual Machines that have their names
ending in "-flat", "-rdm" or "-rdmp" will no longer power on. See the
VMware Knowledge Base article listed under "Workaround" for a
solution.


4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

ESXi and ESX
------------
https://www.vmware.com/patchmgr/download.portal

ESXi 5.5
--------
File: ESXi550-201312001.zip
md5sum: c2edc6fbe983709a5a643fe5e03c055b
sha1sum: df55f419056b2dab25e28ca87ccdd8a099849a40
http://kb.vmware.com/kb/2063795
ESXi550-201312001 contains ESXi550-201312101-SG

ESXi 5.1
--------
File: ESXi510-201310001.zip
md5sum: 00b6a97b3042dc45da52e20b67666387
sha1sum: 8b0e2e832d0c603991718da17e1f73de4f0969cc
http://kb.vmware.com/kb/2053402
ESXi510-201310001 contains ESXi510-201310101-SG

ESXi 5.0
------------------
File: update-from-esxi5.0-5.0_update03.zip
md5sum: 7e6185fa3238a4895613b39e57a2a94b
sha1sum: aa3929d2c8183aeaecdc238cbbf4d270bd70dd07
http://kb.vmware.com/kb/2055559
update-from-esxi5.0-5.0_update03 contains ESXi500-201310101-SG

ESXi 4.1
------------------
File: ESXi410-201312001.zip
md5sum: f85c0c449513b88b22f19a5f11966d5e
sha1sum: cfde5abbef77976b76d55813ae1e7bbbbca25b7b
http://kb.vmware.com/kb/2061210
ESXi410-201312001 contains ESXi410-201312401-SG

ESXi 4.0
------------------
File: ESX400-201310001.zip
md5sum: 9d47cf815ed142a17f97002379b5e386
sha1sum: 91082ec4263333f9b996883cb53dbe9aab7a88b5
http://kb.vmware.com/kb/2059495
ESX400-201310001 contains ESXi400-201310401-SG

ESX 4.1
------------------
File: ESX410-201312001.zip
md5sum: c35763a84db169dd0285442d4129cc18
sha1sum: ee8e1b8d2d383422ff0dde04749c5d89e77d8e40
http://kb.vmware.com/kb/2061209
ESX410-201312001 contains ESX410-201312401-SG

ESX 4.0
------------------
File: ESX400-201310001.zip
md5sum: 9d47cf815ed142a17f97002379b5e386
sha1sum: 91082ec4263333f9b996883cb53dbe9aab7a88b5
http://kb.vmware.com/kb/2059495
ESX400-201310001 contains ESX400-201310401-SG


5. References

VMware Knowledge Base article KB2066856
http://kb.vmware.com/kb/2066856


http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5973

- -----------------------------------------------------------------------

6. Change log

2013-12-22 VMSA-2013-0016
Initial security advisory in conjunction with the release of
ESXi 5.5 patches on 2013-12-22

- -----------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2013 VMware Inc. All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFStz/5DEcm8Vbi9kMRAm/zAKCk/DZkdQF9Q7jafhtk+tvCg39bqACfUGc4
dBB5q6VPIUUcaWflLOwXBI8=
=7LeT
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close