VMware vCenter Multiple Vulnerabilities (VMSA-2015-0007)

Critical Nessus Plugin ID 86255


The remote host has a virtualization management application installed that is affected by multiple vulnerabilities.


The VMware vCenter Server installed on the remote host is affected by the following vulnerabilities :

- A flaw exists in the vpxd service due to improper sanitization of long heartbeat messages. An unauthenticated, remote attacker can exploit this to cause a denial of service. (CVE-2015-1047)

- A flaw exists due to an insecurely configured and remotely accessible JMX RMI service. An unauthenticated, remote attacker can exploit this, via an MLet file, to execute arbitrary code on the vCenter server with the same privileges as the web server. (CVE-2015-2342)


Upgrade to VMware vCenter Server 6.0.0b (6.0.0 build-2776510), 5.5u3 (5.5.0 build-3000241), 5.1u3b (5.1.0 build-3070521), or 5.0u3e (5.0.0 build-3073234) or later.

See Also



Plugin Details

Severity: Critical

ID: 86255

File Name: vmware_vcenter_vmsa-2015-0007.nasl

Version: $Revision: 1.10 $

Type: remote

Family: Misc.

Published: 2015/10/02

Modified: 2016/08/16

Dependencies: 63061

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/vCenter, Host/VMware/version, Host/VMware/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/10/01

Vulnerability Publication Date: 2015/10/01

Exploitable With

Core Impact

Metasploit (Java JMX Server Insecure Configuration Java Code Execution)

Reference Information

CVE: CVE-2015-1047, CVE-2015-2342

OSVDB: 128332, 128333

VMSA: 2015-0007

IAVA: 2015-A-0236, 2015-A-0237

EDB-ID: 36101

ZDI: ZDI-15-455