This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The remote VMware ESX host is missing a security-related patch.
The remote VMware ESX host is affected by multiple vulnerabilities
in the Bash shell :
- A command injection vulnerability exists in GNU Bash
known as Shellshock. The vulnerability is due to the
processing of trailing strings after function
definitions in the values of environment variables. This
allows a remote attacker to execute arbitrary code via
environment variable manipulation depending on the
configuration of the system. (CVE-2014-6271,
CVE-2014-7169, CVE-2014-6277, CVE-2014-6278)
- A out-of-bounds read error exists in the redirection
implementation in file parse.y when evaluating
untrusted input during stacked redirects handling. A
remote attacker can exploit this to cause a denial of
service or possibly have other unspecified impact.
- An off-by-one overflow condition exists in the
read_token_word() function in file parse.y when handling
deeply nested flow control structures. A remote attacker
can exploit this, by using deeply nested for-loops, to
cause a denial of service or possibly execute arbitrary
See also :
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 9.0
Public Exploit Available : true
Nessus Plugin ID: 87680 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now