ESXi 6.5 / 6.7 Multiple Vulnerabilities (VMSA-2019-0006) (Remote Check)

medium Nessus Plugin ID 124300

Synopsis

The remote VMware ESXi host is missing a security patch and is affected by multiple vulnerabilities.

Description

The remote VMware ESXi host is version 6.5 or 6.7 and is missing a security patch. It is, therefore, vulnerable to multiple vulnerabilities, including:

- An out-of-bounds read vulnerability exists in the vertex shader component of the 3D-acceleration feature could allow an authenticated attacker to disclose sensitive information or cause a denial-of-service of the guest virtual machine. (CVE-2019-5516)

- An out-of-bounds read vulnerability exists in the shader translator component of the 3D-acceleration feature could allow an authenticated attacker to disclose sensitive information or cause a denial-of-service of the guest virtual machine. (CVE-2019-5517)

- An out-of-bounds read vulnerability in the 3D-acceleration feature could allow an authenticated attacker to disclose sensitive information.
(CVE-2019-5520)

Note virtual machines must be configured with the 3D-acceleration enabled. VMware ESXi defaults to this feature not being enabled.

Solution

Apply the appropriate patch as referenced in the vendor advisory.

See Also

https://www.vmware.com/security/advisories/VMSA-2019-0006.html

Plugin Details

Severity: Medium

ID: 124300

File Name: vmware_esxi_VMSA-2019-0006.nasl

Version: 1.4

Type: remote

Family: Misc.

Published: 4/25/2019

Updated: 9/2/2020

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2019-5516

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi

Required KB Items: Settings/ParanoidReport, Host/VMware/release, Host/VMware/version, Host/VMware/vsphere

Exploit Ease: No known exploits are available

Patch Publication Date: 4/11/2019

Vulnerability Publication Date: 4/11/2019

Reference Information

CVE: CVE-2019-5516, CVE-2019-5517, CVE-2019-5520

BID: 107878, 107879, 107880

IAVA: 2019-A-0134

VMSA: 2019-0006