ESXi 5.0 < Build 702118 Multiple Vulnerabilities (remote check)

High Nessus Plugin ID 70882


The remote VMware ESXi 5.0 host is affected by multiple security vulnerabilities.


The remote VMware ESXi 5.0 host is affected by the following security vulnerabilities :

- An error exists related to NFS traffic handling that could allow memory corruption leading to execution of arbitrary code. (CVE-2012-2448)

- Out-of-bounds write errors exist related to virtual floppy disc devices and virtual SCSI devices that could allow local privilege escalation. (CVE-2012-2449, CVE-2012-2450)


Apply patch ESXi500-201205401-SG. Alternatively, implement the workaround referenced in the vendor advisory.

See Also

Plugin Details

Severity: High

ID: 70882

File Name: vmware_esxi_5_0_build_702118_remote.nasl

Version: $Revision: 1.4 $

Type: remote

Family: Misc.

Published: 2013/11/13

Modified: 2017/06/12

Dependencies: 57396

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.0

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/05/03

Vulnerability Publication Date: 2012/05/03

Reference Information

CVE: CVE-2012-2448, CVE-2012-2449, CVE-2012-2450

BID: 53369, 53371

OSVDB: 81693, 81694, 81695

VMSA: 2012-0009