Synopsis
The remote VMware ESXi 5.0 host is affected by multiple vulnerabilities.
Description
The remote VMware ESXi 5.0 host is affected by multiple vulnerabilities :
  - A denial of service vulnerability exists in the     big2_toUtf8() function in file lib/xmltok.c in the     libexpat library. A remote attacker can exploit this,     via an XML document having malformed UTF-8 sequences, to     cause a buffer over-read, thus crashing the application.
    (CVE-2009-3560)
  - A denial of service vulnerability exists in the     updatePosition() function in file lib/xmltok.c in the     libexpat library. A remote attacker can exploit this,     via an XML document having malformed UTF-8 sequences, to     cause a buffer over-read, thus crashing the application.
    (CVE-2009-3720)
  - An integer overflow condition exists in the     BZ2_decompress() function in file decompress.c in the     bzip2 and libbzip2 library. A remote attacker can     exploit this, via a crafted compressed file, to cause     a denial of service or the execution of arbitrary code.
    (CVE-2010-0405)
  - A denial of service vulnerability exists in the audioop     module due to multiple integer overflows conditions in     file audioop.c. A remote attacker can exploit this, via     a large fragment or argument, to cause a buffer     overflow, resulting in an application crash.
    (CVE-2010-1634)
  - A denial of service vulnerability exists in the audioop     module due to a failure to verify the relationships     between size arguments and byte string length. A remote     attacker can exploit this, via crafted arguments, to     cause memory corruption, resulting in an application     crash. (CVE-2010-2089)
  - A flaw exists in the urllib and urllib2 modules due to     processing Location headers that specify redirection to     a file. A remote attacker can exploit this, via a     crafted URL, to gain sensitive information or cause a     denial of service. (CVE-2011-1521)
  - A privilege escalation vulnerability exists due to an     incorrect ACL being used for the VMware Tools folder. An     attacker on an adjacent network with access to a guest     operating system can exploit this to gain elevated     privileges on the guest operating system.
    (CVE-2012-1518)
Solution
Apply patches ESXi500-201203102-SG and ESXi500-201203101-SG according to the vendor advisory.
Plugin Details
File Name: vmware_esxi_5_0_build_608089_remote.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: cpe:/o:vmware:esxi:5.0
Required KB Items: Host/VMware/release, Host/VMware/version
Exploit Ease: Exploits are available
Patch Publication Date: 3/15/2012
Vulnerability Publication Date: 11/5/2009
Exploitable With
CANVAS (White_Phosphorus)
Reference Information
CVE: CVE-2009-3560, CVE-2009-3720, CVE-2010-0405, CVE-2010-1634, CVE-2010-2089, CVE-2011-1521, CVE-2012-1518
BID: 36097, 37203, 40370, 40863, 43331, 47024, 53006