VMware Player 6.x < 6.0.6 RPC Command DoS (VMSA-2015-0004) (Linux)

high Nessus Plugin ID 84221

Synopsis

The remote host has a virtualization application installed that is affected by a denial of service vulnerability.

Description

The version of VMware Player installed on the remote Linux host is 6.x prior to 6.0.6. It is, therefore, affected by a denial of service vulnerability due to improper validation of user-supplied input to a remote procedure call (RPC) command. An unauthenticated, remote attacker can exploit this, via a crafted command, to crash the host or guest operating systems.

Solution

Upgrade to VMware Player version 6.0.6 or later.

See Also

http://www.vmware.com/security/advisories/VMSA-2015-0004.html

Plugin Details

Severity: High

ID: 84221

File Name: vmware_player_linux_6_0_6.nasl

Version: 1.11

Type: local

Family: General

Published: 6/16/2015

Updated: 3/1/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2015-2341

Vulnerability Information

CPE: cpe:/a:vmware:player

Required KB Items: Host/uname, Host/VMware Player/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/9/2015

Vulnerability Publication Date: 6/9/2015

Reference Information

CVE: CVE-2015-2341

BID: 75094

VMSA: 2015-0004