VMware ESX Privilege Escalation (VMSA-2010-0017) (remote check)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote VMware ESX host is missing a security-related patch.

Description :

The remote VMware ESX host is missing a security-related patch. It is,
therefore, affected by a memory allocation issue in the Linux 64-bit
kernel due to a failure by the compat_alloc_user_space() function to
properly allocate the user space memory required for the 32-bit
compatibility layer. A local attacker can exploit this to gain
elevated privileges by leveraging the ability of the
compat_mc_getsockopt() function to control a certain length value.

See also :

http://lists.vmware.com/pipermail/security-announce/2011/000117.html

Solution :

Apply the appropriate patch as referenced in the vendor advisory that
pertains to ESX version 4.0 / 4.1.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.6
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: VMware ESX Local Security Checks

Nessus Plugin ID: 89743 ()

Bugtraq ID: 43239

CVE ID: CVE-2010-3081

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now