CVE-2013-1659
Summary
| CVE | CVE-2013-1659 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-02-22 20:55:00 UTC |
| Updated | 2013-02-25 05:00:00 UTC |
| Description | VMware vCenter Server 4.0 before Update 4b, 5.0 before Update 2, and 5.1 before 5.1.0b; VMware ESXi 3.5 through 5.1; and VMware ESX 3.5 through 4.1 do not properly implement the Network File Copy (NFC) protocol, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption) by modifying the client-server data stream. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Vmware | Esxi | 3.5 | All | All | All |
| Operating System | Vmware | Esxi | 3.5 | 1 | All | All |
| Operating System | Vmware | Esxi | 4.0 | All | All | All |
| Operating System | Vmware | Esxi | 4.0 | 1 | All | All |
| Operating System | Vmware | Esxi | 4.0 | 2 | All | All |
| Operating System | Vmware | Esxi | 4.0 | 3 | All | All |
| Operating System | Vmware | Esxi | 4.0 | 4 | All | All |
| Operating System | Vmware | Esxi | 4.1 | All | All | All |
| Operating System | Vmware | Esxi | 4.1 | 1 | All | All |
| Operating System | Vmware | Esxi | 4.1 | 2 | All | All |
| Operating System | Vmware | Esxi | 5.0 | All | All | All |
| Operating System | Vmware | Esxi | 5.0 | 1 | All | All |
| Operating System | Vmware | Esxi | 5.0 | 2 | All | All |
| Operating System | Vmware | Esxi | 5.1 | All | All | All |
| Operating System | Vmware | Esxi | 3.5 | All | All | All |
| Operating System | Vmware | Esxi | 3.5 | 1 | All | All |
| Operating System | Vmware | Esxi | 4.0 | All | All | All |
| Operating System | Vmware | Esxi | 4.0 | 1 | All | All |
| Operating System | Vmware | Esxi | 4.0 | 2 | All | All |
| Operating System | Vmware | Esxi | 4.0 | 3 | All | All |
| Operating System | Vmware | Esxi | 4.0 | 4 | All | All |
| Operating System | Vmware | Esxi | 4.1 | All | All | All |
| Operating System | Vmware | Esxi | 4.1 | 1 | All | All |
| Operating System | Vmware | Esxi | 4.1 | 2 | All | All |
| Operating System | Vmware | Esxi | 5.0 | All | All | All |
| Operating System | Vmware | Esxi | 5.0 | 1 | All | All |
| Operating System | Vmware | Esxi | 5.0 | 2 | All | All |
| Operating System | Vmware | Esxi | 5.1 | All | All | All |
| Application | Vmware | Vcenter Server | 4.0 | All | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_1 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_2 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_3 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_4 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_4a | All | All |
| Application | Vmware | Vcenter Server | 5.0 | All | All | All |
| Application | Vmware | Vcenter Server | 5.0 | update_1 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | All | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_1 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_2 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_3 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_4 | All | All |
| Application | Vmware | Vcenter Server | 4.0 | update_4a | All | All |
| Application | Vmware | Vcenter Server | 5.0 | All | All | All |
| Application | Vmware | Vcenter Server | 5.0 | update_1 | All | All |
| Application | Vmware | Vcenter Server Appliance | 5.1 | All | All | All |
| Application | Vmware | Vcenter Server Appliance | 5.1.0a | All | All | All |
| Application | Vmware | Vcenter Server Appliance | 5.1 | All | All | All |
| Application | Vmware | Vcenter Server Appliance | 5.1.0a | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| VMSA-2013-0003 | CONFIRM | www.vmware.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.