VMSA-2016-0002 : VMware product updates address a critical glibc security vulnerability

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESXi host is missing a security-related patch.

Description :

a. glibc update for multiple products.

The glibc library has been updated in multiple products to resolve
a stack-based buffer overflow present in the glibc getaddrinfo function.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-7547.

VMware products have been grouped into the following four
categories :

I) ESXi and ESX Hypervisor
Versions of ESXi and ESX prior to 5.5 are not affected because
they do not ship with a vulnerable version of glibc.
ESXi 5.5 and ESXi 6.0 ship with a vulnerable version of glibc and
are affected.
See table 1 for remediation for ESXi 5.5 and ESXi 6.0.

II) Windows-based products
Windows-based products, including all versions of vCenter Server
running on Windows, are not affected.

III) VMware virtual appliances
VMware virtual appliances ship with a vulnerable version of glibc
and are affected.
See table 2 for remediation for appliances.

IV) Products that run on Linux
VMware products that run on Linux (excluding virtual appliances)
might use a vulnerable version of glibc as part of the base
operating system. If the operating system has a vulnerable version
of glibc, VMware recommends that customers contact their operating
system vendor for resolution.

WORKAROUND

Workarounds are available for several virtual appliances. These are
documented in VMware KB article 2144032.

RECOMMENDATIONS

VMware recommends customers evaluate and deploy patches for
affected products in Table 1 and 2 below as these patches become
available. In case patches are not available, customers are
advised to deploy the workaround.

Column 4 of the following tables lists the action required to
remediate the vulnerability in each release, if a solution is
available.

Table 1 - ESXi
==============

See also :

http://lists.vmware.com/pipermail/security-announce/2016/000320.html
https://www.tenable.com/security/research/tra-2017-08

Solution :

Apply the missing patch.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: VMware ESX Local Security Checks

Nessus Plugin ID: 88954 ()

Bugtraq ID:

CVE ID: CVE-2015-7547

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now