VMware Host Agent Directory Traversal (VMSA-2009-0015)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

A web application on the remote host has a directory traversal
vulnerability.

Description :

The version of VMware Host Agent (hostd) running on the remote host
has a directory traversal vulnerability. The affected service runs
as root. VMware ESX, VMware ESXi, and VMware Server on Linux are
affected.

A remote attacker could exploit this to read arbitrary files,
including guest VMs, from the system.

See also :

http://www.nessus.org/u?1ead3846
http://fyrmassociates.com/tools/gueststealer-v1.pl
http://archives.neohapsis.com/archives/bugtraq/2009-10/0275.html
http://www.vmware.com/security/advisories/VMSA-2009-0015.html

Solution :

Apply the relevant upgrade referenced in the VMware advisory.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 44646 ()

Bugtraq ID: 36842

CVE ID: CVE-2009-3733