ESXi 5.0 < Build 764879 Multiple Vulnerabilities (remote check)

This script is (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESXi 5.0 host is affected by multiple security
vulnerabilities.

Description :

The remote VMware ESXi 5.0 host is affected by the following security
vulnerabilities :

- Errors exist in the Libxml2 library functions
'xmlXPathNextPrecedingSibling', 'xmlNodePtr' and
'xmlXPathNextPrecedingInternal' that could allow
denial of service attacks or arbitrary code execution.
(CVE-2010-4008)

- Buffer overflow errors exist in the libxml2 library
functions 'xmlCharEncFirstLineInt' and
'xmlCharEncInFunc' that could allow denial of service
attacks or arbitrary code execution. (CVE-2011-0216)

- A buffer overflow error exists in the libxml2 library
file 'xpath.c' related to handling 'XPath' nodesets that
could allow denial of service attacks or arbitrary code
execution. (CVE-2011-1944)

- A double-free error exists in the libxml2 library
function 'xmlXPathCompOpEval' related to handling
invalid 'XPath' expressions that could allow denial of
service attacks or arbitrary code execution.
(CVE-2011-2834)

- An out-of-bounds read error exists in the libxml2
library file 'parser.c' related to handling 'Stop'
orders that could allow denial of service attacks.
(CVE-2011-3905)

- A buffer overflow error exists in the libxml2 library
function 'xmlStringLenDecodeEntities' related to
copying entities that could allow denial of service
attacks or arbitrary code execution. (CVE-2011-3919)

- An error exists in the libxml2 library related to hash
collisions that could allow denial of service attacks.
(CVE-2012-0841)

See also :

http://kb.vmware.com/kb/2020572
http://www.vmware.com/security/advisories/VMSA-2012-0012.html

Solution :

Apply ESXi500-201207101-SG.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false