vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2023-0023.html | Vendor Advisory |
https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server | Exploit Third Party Advisory |
https://www.vmware.com/security/advisories/VMSA-2023-0023.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Dec 2024, 17:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server - Exploit, Third Party Advisory |
Information
Published : 2023-10-25 18:17
Updated : 2024-12-20 17:41
NVD link : CVE-2023-34048
Mitre link : CVE-2023-34048
CVE.ORG link : CVE-2023-34048
JSON object : View
Products Affected
vmware
- vcenter_server
CWE
CWE-787
Out-of-bounds Write