CVE-2017-4922
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
VMware vCenter Server (6.5 prior to 6.5 U1) contains an information disclosure issue due to the service startup script using world writable directories as temporary storage for critical information. Successful exploitation of this issue may allow unprivileged host users to access certain critical information when the service gets restarted.
VMware vCenter Server en su versión 6.5 anterior a la 6.5 U1 tiene un problema de fuga de información puesto que el script de inicio del servicio utiliza directorios modificables por cualquier usuario para almacenar temporalmente información crítica. Si se explota con éxito esta vulnerabilidad, podría permitir que los usuarios host sin privilegios accedan a información crítica cuando el servicio se reinicie.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-12-26 CVE Reserved
- 2017-08-01 CVE Published
- 2023-05-17 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/100012 | Third Party Advisory | |
http://www.securitytracker.com/id/1039013 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.vmware.com/security/advisories/VMSA-2017-0013.html | 2017-08-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Vcenter Server Search vendor "Vmware" for product "Vcenter Server" | 6.5 Search vendor "Vmware" for product "Vcenter Server" and version "6.5" | - |
Affected
|