ESXi 5.1 < Build 911593 Multiple Vulnerabilities (remote check)

This script is (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

The remote VMware ESXi 5.1 host is affected by multiple security

Description :

The remote VMware ESXi 5.1 host is affected by the following security
vulnerabilities :

- An input validation error exists in the function
'png_set_text_2' in the libpng library that could
allow memory corruption and arbitrary code execution.

- A privilege escalation vulnerability exists in the
Virtual Machine Communication Interface (VMCI). A local
attacker can exploit this, via control code, to change
allocated memory, resulting in the escalation of
privileges. (CVE-2013-1406)

- An error exists related to Network File Copy (NFC)
handling that could allow denial of service attacks or
arbitrary code execution. (CVE-2013-1659)

See also :

Solution :

Apply ESXi510-201212001-SG.

Risk factor :

High / CVSS Base Score : 7.6
CVSS Temporal Score : 6.0
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 70888 ()

Bugtraq ID: 52830

CVE ID: CVE-2011-3048

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now