VMware ESX Privilege Escalation (VMSA-2010-0017) (remote check)

high Nessus Plugin ID 89743

Synopsis

The remote VMware ESX host is missing a security-related patch.

Description

The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by a memory allocation issue in the Linux 64-bit kernel due to a failure by the compat_alloc_user_space() function to properly allocate the user space memory required for the 32-bit compatibility layer. A local attacker can exploit this to gain elevated privileges by leveraging the ability of the compat_mc_getsockopt() function to control a certain length value.

Solution

Apply the appropriate patch as referenced in the vendor advisory that pertains to ESX version 4.0 / 4.1.

See Also

http://lists.vmware.com/pipermail/security-announce/2011/000117.html

Plugin Details

Severity: High

ID: 89743

File Name: vmware_VMSA-2010-0017_remote.nasl

Version: 1.5

Type: remote

Published: 3/8/2016

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:vmware:esx

Required KB Items: Host/VMware/release, Host/VMware/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/29/2010

Vulnerability Publication Date: 9/16/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-3081

BID: 43239

VMSA: 2010-0017