VMware ESX Multiple Vulnerabilities (VMSA-2010-0007) (remote check)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESX host is missing a security-related patch.

Description :

The remote VMware ESX host is missing a security-related patch. It is,
therefore, affected by multiple vulnerabilities :

- A format string flaw exists in the VMware Remote Console
that allows a remote attacker to execute arbitrary code.
(CVE-2009-3732)

- A flaw exists in VMware Tools due to improper access to
libraries. A remote attacker can exploit this to execute
arbitrary code by convincing a Windows guest OS user
into clicking on a file that is stored on a network
share. (CVE-2010-1141)

- A flaw exists in VMware Tools due to improper loading of
VMware programs. An attacker with access to a Windows
guest OS can escalate privileges by placing a Trojan
horse program at an unspecified location on the guest OS
disk. (CVE-2010-1142)

See also :

https://www.vmware.com/security/advisories/VMSA-2010-0007
http://lists.vmware.com/pipermail/security-announce/2010/000091.html

Solution :

Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 3.5 / 4.0.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: VMware ESX Local Security Checks

Nessus Plugin ID: 89739 ()

Bugtraq ID: 39392
39394
39396

CVE ID: CVE-2009-3732
CVE-2010-1141
CVE-2010-1142

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now