VMware Fusion < 5.0.5 / 6.0.4 OpenSSL Library Multiple Vulnerabilities

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

A VMware product installed on the remote host is affected by multiple

Description :

The version of VMware Fusion installed on the remote Mac OS X is
version 5.x prior to 5.0.5 or 6.x prior to 6.0.4. It is, therefore,
affected by the following vulnerabilities in the OpenSSL library :

- An error exists in the function 'ssl3_read_bytes'
that could allow data to be injected into other
sessions or allow denial of service attacks. Note
this issue is only exploitable if
'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2010-5298)

- An error exists in the function 'do_ssl3_write' that
could allow a NULL pointer to be dereferenced leading
to denial of service attacks. Note this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
enabled. (CVE-2014-0198)

- An unspecified error exists that could allow an
attacker to cause usage of weak keying material
leading to simplified man-in-the-middle attacks.

- An unspecified error exists related to anonymous ECDH
ciphersuites that could allow denial of service
attacks. Note this issue only affects OpenSSL TLS
clients. (CVE-2014-3470)

See also :


Solution :

Upgrade to VMware Fusion 5.0.5 / 6.0.4 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.3
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 76452 ()

Bugtraq ID: 66801

CVE ID: CVE-2010-5298

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial