Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.103662
Category:VMware Local Security Checks
Title:VMware ESXi/ESX VMCI privilege escalation vulnerability (VMSA-2013-0002)
Summary:The remote ESXi is missing one or more security related Updates from VMSA-2013-0002.
Description:Summary:
The remote ESXi is missing one or more security related Updates from VMSA-2013-0002.

Vulnerability Insight:
a. VMware VMCI privilege escalation

VMware ESX, Workstation, Fusion, and View contain a vulnerability in the
handling of control code in vmci.sys. A local malicious user may exploit this
vulnerability to manipulate the memory allocation through the Virtual Machine
Communication Interface (VMCI) code. This could result in a privilege escalation
on Windows-based hosts and on Windows-based Guest Operating Systems.

The vulnerability does not allow for privilege escalation from the Guest
Operating System to the host (and vice versa). This means that host memory can
not be manipulated from the Guest Operating System (and vice versa).

Systems that have VMCI disabled are also affected by this issue.

Affected Software/OS:
VMware ESXi 5.1 without ESXi510-201212102-SG

VMware ESXi 5.0 without ESXi500-201212102-SG

VMware ESXi 4.1.without ESXi410-201211402-BG

VMware ESXi 4.0 without ESXi400-201302402-SG

VMware ESX 4.1.without ESX410-201211401-SG

VMware ESX 4.0 without ESX400-201302401-SG

Solution:
Apply the missing patch(es).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-1406
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17164
CopyrightCopyright (C) 2013 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.