VMSA-2016-0002 : VMware product updates address a critical glibc security vulnerability

high Nessus Plugin ID 88954

Synopsis

The remote VMware ESXi host is missing a security-related patch.

Description

a. glibc update for multiple products.

The glibc library has been updated in multiple products to resolve a stack-based buffer overflow present in the glibc getaddrinfo function.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-7547.

VMware products have been grouped into the following four categories :
I) ESXi and ESX Hypervisor Versions of ESXi and ESX prior to 5.5 are not affected because they do not ship with a vulnerable version of glibc.
ESXi 5.5 and ESXi 6.0 ship with a vulnerable version of glibc and are affected. See table 1 for remediation for ESXi 5.5 and ESXi 6.0.
II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected.

III) VMware virtual appliances VMware virtual appliances ship with a vulnerable version of glibc and are affected. See table 2 for remediation for appliances.
IV) Products that run on Linux VMware products that run on Linux (excluding virtual appliances) might use a vulnerable version of glibc as part of the base operating system. If the operating system has a vulnerable version of glibc, VMware recommends that customers contact their operating system vendor for resolution. WORKAROUND

Workarounds are available for several virtual appliances. These are documented in VMware KB article 2144032.

RECOMMENDATIONS

VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. In case patches are not available, customers are advised to deploy the workaround.

Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available.

Table 1 - ESXi ==============

Solution

Apply the missing patch.

See Also

http://lists.vmware.com/pipermail/security-announce/2016/000320.html

https://www.tenable.com/security/research/tra-2017-08

Plugin Details

Severity: High

ID: 88954

File Name: vmware_VMSA-2016-0002.nasl

Version: 2.20

Type: local

Published: 2/25/2016

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.5, cpe:/o:vmware:esxi:6.0

Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/22/2016

Reference Information

CVE: CVE-2015-7547