VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2011-0007) (remote check)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESX / ESXi host is missing a security-related patch.

Description :

The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities :

- Multiple forgery vulnerabilities exist in the bundled
version of MIT Kerberos 5 (krb5). An attacker can
exploit these issues to impersonate a client, escalate
privileges, and disclose sensitive information.
(CVE-2010-1323, CVE-2010-1324, CVE-2010-4020,
CVE-2010-4021)

- A local arbitrary code execution vulnerability exists in
the Kernel in the do_anonymous_page() function due to
improper separation of the stack and the heap. A local
attacker can exploit this vulnerability to execute
arbitrary code. (CVE-2010-2240)

- A denial of service vulnerability exists that allows a
remote attacker to exhaust available sockets, preventing
further connections. (CVE-2011-1785)

- A denial of service vulnerability exists in the bundled
version of lsassd in Likewise Open. A remote attacker
can exploit this, via an Active Directory login attempt
that provides a username containing an invalid byte
sequence, to cause a daemon crash. (CVE-2011-1786)

See also :

https://www.vmware.com/security/advisories/VMSA-2011-0007
http://lists.vmware.com/pipermail/security-announce/2011/000133.html

Solution :

Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.1
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now