VMware Security Updates for vCenter Server (VMSA-2014-0006)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote host has a virtualization management application installed
that is affected by multiple OpenSSL security vulnerabilities.

Description :

The version of VMware vCenter installed on the remote host is prior to
5.0 Update 3a, 5.1 Update 2a, or 5.5 Update 1b. It is, therefore,
affected by multiple OpenSSL vulnerabilities :

- An error exists in the function 'ssl3_read_bytes'
that could allow data to be injected into other
sessions or allow denial of service attacks. Note
this issue is only exploitable if
'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2010-5298)

- An error exists in the function 'do_ssl3_write' that
could allow a NULL pointer to be dereferenced leading to
denial of service attacks. Note this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
enabled. (CVE-2014-0198)

- An unspecified error exists that could allow an
attacker to cause usage of weak keying material
leading to simplified man-in-the-middle attacks.
(CVE-2014-0224)

- An unspecified error exists related to anonymous ECDH
cipher suites that could allow denial of service
attacks. Note this issue only affects OpenSSL TLS
clients. (CVE-2014-3470)

See also :

http://www.vmware.com/security/advisories/VMSA-2014-0006.html
https://www.openssl.org/news/secadv/20140605.txt

Solution :

Upgrade to VMware vCenter Server 5.0U3a, 5.1U2a, or 5.5U1b.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 76457 ()

Bugtraq ID: 66801
67193
67898
67899

CVE ID: CVE-2010-5298
CVE-2014-0198
CVE-2014-0224
CVE-2014-3470

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now