How to Buy
This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote VMware ESXi / ESX host is missing a security-related
The remote VMware ESXi / ESX host is potentially affected by the
following vulnerabilities :
- A buffer overflow flaw exists that allows remote,
authenticated attackers to execute arbitrary code.
- A directory traversal flaw exists that allows remote
attackers to delete arbitrary files. (CVE-2013-3658)
Note that the vendor has not publicly acknowledged these flaws.
See also :
The vendor reportedly has silently patched these issues in the
following releases :
- ESX/ESXi 4.0: Patch 201203401
- ESX/ESXi 4.1: Patch 201201401
- ESXi 5.0: Patch 201203101
Risk factor :
High / CVSS Base Score : 9.4
CVSS Temporal Score : 7.0
Public Exploit Available : false
Family: VMware ESX Local Security Checks
Nessus Plugin ID: 70448 ()
Bugtraq ID: 6231662323
CVE ID: CVE-2013-3657CVE-2013-3658
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.