This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote host has a virtualization client application installed that
is affected by multiple vulnerabilities.
The version of vSphere Client installed on the remote Windows host is
is affected by the following vulnerabilities in the OpenSSL library :
- An error exists in the function 'ssl3_read_bytes'
that could allow data to be injected into other
sessions or allow denial of service attacks. Note
this issue is only exploitable if
'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2010-5298)
- An error exists in the function 'do_ssl3_write' that
could allow a NULL pointer to be dereferenced leading to
denial of service attacks. Note this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
- An unspecified error exists that could allow an
attacker to cause usage of weak keying material
leading to simplified man-in-the-middle attacks.
- An unspecified error exists related to anonymous ECDH
ciphersuites that could allow denial of service
attacks. Note this issue only affects OpenSSL TLS
See also :
Upgrade to vSphere Client 5.0 Update 3a / 5.1 Update 2a / 5.5 Update
1b or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.3
Public Exploit Available : true