VMware Host Agent Directory Traversal (VMSA-2009-0015)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

A web application on the remote host has a directory traversal
vulnerability.

Description :

The version of VMware Host Agent (hostd) running on the remote host
has a directory traversal vulnerability. The affected service runs
as root. VMware ESX, VMware ESXi, and VMware Server on Linux are
affected.

A remote attacker could exploit this to read arbitrary files,
including guest VMs, from the system.

See also :

http://www.nessus.org/u?1ead3846
http://fyrmassociates.com/tools/gueststealer-v1.pl
http://seclists.org/bugtraq/2009/Oct/274
http://www.vmware.com/security/advisories/VMSA-2009-0015.html

Solution :

Apply the relevant upgrade referenced in the VMware advisory.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 44646 ()

Bugtraq ID: 36842

CVE ID: CVE-2009-3733

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now