VMSA-2012-0018 : VMware security updates for vCSA and ESXi

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESXi host is missing one or more security-related
patches.

Description :

a. vCenter Server Appliance directory traversal

The vCenter Server Appliance (vCSA) contains a directory
traversal vulnerability that allows an authenticated
remote user to retrieve arbitrary files. Exploitation of
this issue may expose sensitive information stored on the
server.

VMware would like to thank Alexander Minozhenko from ERPScan for
reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-6324 to this issue.

b. vCenter Server Appliance arbitrary file download

The vCenter Server Appliance (vCSA) contains an XML parsing
vulnerability that allows an authenticated remote user to
retrieve arbitrary files. Exploitation of this issue may
expose sensitive information stored on the server.

VMware would like to thank Alexander Minozhenko from ERPScan for
reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-6325 to this issue.

c. Update to ESX glibc package

The ESX glibc package is updated to version glibc-2.5-81.el5_8.1
to resolve multiple security issues.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-5029, CVE-2009-5064,
CVE-2010-0830, CVE-2011-1089, CVE-2011-4609, CVE-2012-0864
CVE-2012-3404, CVE-2012-3405, CVE-2012-3406 and CVE-2012-3480
to these issues.

d. vCenter Server and vCSA webservice logging denial of service

The vCenter Server and vCenter Server Appliance (vCSA) both
contain a vulnerability that allows unauthenticated remote
users to create abnormally large log entries. Exploitation
of this issue may allow an attacker to fill the system volume
of the vCenter host or appliance VM and create a
denial-of-service condition.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-6326 to this issue.

See also :

http://lists.vmware.com/pipermail/security-announce/2013/000212.html

Solution :

Apply the missing patches.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false