ESXi 5.0 < Build 515841 Multiple Vulnerabilities (remote check)

This script is (C) 2013-2016 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESXi 5.0 host is affected by multiple security
vulnerabilities.

Description :

The remote VMware ESXi 5.0 host is affected by the following security
vulnerabilities :

- A security bypass vulnerability exists in the e1000
driver in the Linux kernel due to improper handling of
Ethernet frames that exceed the MTU. An unauthenticated,
remote attacker can exploit this, via trailing payload
data, to bypass packet filters. (CVE-2009-4536)

- An error exists in the file misc/mntent_r.c that could
allow a local attacker to cause denial of service
conditions. (CVE-2010-0296)

- An error exists related to glibc, the dynamic linker
and '$ORIGIN' substitution that could allow privilege
escalation. (CVE-2011-0536)

- An error exists in the function 'fnmatch' in the file
posix/fnmatch.c that could allow arbitrary code
execution. (CVE-2011-1071)

- An error exists in the file locale/programs/locale.c
related to localization environment variables that
could allow privilege escalation. (CVE-2011-1095)

- An error exists related to glibc, the dynamic linker
and 'RPATH' that could allow privilege escalation.
(CVE-2011-1658)

- An error exists in the function 'fnmatch' related to
UTF-8 string handling that could allow privilege
escalation. (CVE-2011-1659)

See also :

http://www.vmware.com/security/advisories/VMSA-2011-0012.html
http://www.vmware.com/security/advisories/VMSA-2011-0009.html
http://kb.vmware.com/kb/2007671
http://kb.vmware.com/kb/2007673
http://kb.vmware.com/kb/2007680

Solution :

Apply patches ESXi500-201112401-SG and ESXi500-201112403-SG.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true