ESXi 5.0 < Build 1022489 Multiple libxml2 Vulnerabilities (remote check)

This script is (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESXi 5.0 host is affected by multiple
vulnerabilities.

Description :

The remote VMware ESXi 5.0 host is affected by the following
vulnerabilities related to the bundled limxml2 library :

- An off-by-one overflow condition exists in the
xmlXPtrEvalXPtrPart() function due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this, via a specially
crafted XML file, to cause a denial of service condition
or the execution of arbitrary code. (CVE-2011-3102)

- Multiple integer overflow conditions exist due to
improper validation of user-supplied input when handling
overly long strings. An unauthenticated, remote
attacker can exploit this, via a specially crafted XML
file, to cause a denial of service condition or the
execution of arbitrary code. (CVE-2012-2807)

- An underflow condition exists in the
xmlParseAttValueComplex() function that is triggered
when parsing strings not containing an expected space.
An unauthenticated, remote attacker can exploit this,
via a specially crafted XML file, to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2012-5134)

See also :

http://kb.vmware.com/kb/2044378
http://www.vmware.com/security/advisories/VMSA-2013-0001.html
http://www.vmware.com/security/advisories/VMSA-2013-0004.html

Solution :

Apply patch ESXi500-201303101-SG.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 70877 ()

Bugtraq ID: 53540
54718
56684

CVE ID: CVE-2011-3102
CVE-2012-2807
CVE-2012-5134