VMware vCenter Converter 5.1.x < 5.1.2 / 5.5.x < 5.5.3 Multiple Vulnerabilities (VMSA-2014-0010) (Shellshock)

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote host has an application installed that is affected by
multiple vulnerabilities.

Description :

The version of VMware vCenter Converter installed on the remote
Windows host is 5.1.x prior to 5.1.2 or 5.5.x prior to 5.5.3. It is,
therefore, affected by the following vulnerabilities :

- A command injection vulnerability exists in GNU Bash
known as Shellshock, which is due to the processing of
trailing strings after function definitions in the
values of environment variables. This allows a remote
attacker to execute arbitrary code via environment
variable manipulation depending on the configuration of
the system. While this host is not directly impacted by
Shellshock, the standalone Converter application does
deploy a Helper VM during Linux P2V conversions. This
Helper VM contains a vulnerable version of Bash.
(CVE-2014-6271, CVE-2014-6277, CVE-2014-6278,
CVE-2014-7169, CVE-2014-7186, CVE-2014-7187)

- A memory double-free error exists in 'd1_both.c' related
to handling DTLS packets that allows denial of service
attacks. (CVE-2014-3505)

- An unspecified error exists in 'd1_both.c' related to
handling DTLS handshake messages that allows denial of
service attacks due to large amounts of memory being
consumed. (CVE-2014-3506)

- A memory leak error exists in 'd1_both.c' related to
handling specially crafted DTLS packets that allows
denial of service attacks. (CVE-2014-3507)

- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allows denial of service attacks
against clients. (CVE-2014-3510)

See also :

http://www.vmware.com/security/advisories/VMSA-2014-0010.html
http://seclists.org/oss-sec/2014/q3/650
https://www.invisiblethreat.ca/post/shellshock/

Solution :

Upgrade to VMware vCenter Converter 5.1.2 / 5.5.3 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.0
(CVSS2#E:POC/RL:ND/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now