VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2014-0002)

Medium Nessus Plugin ID 87674


The remote VMware ESX / ESXi host is missing a security-related patch.


The remote VMware ESX / ESXi host is affected by multiple vulnerabilities :

- Multiple integer overflow conditions exist in the glibc package in file malloc/malloc.c. An unauthenticated, remote attacker can exploit these to cause heap memory corruption by passing large values to the pvalloc(), valloc(), posix_memalign(), memalign(), or aligned_alloc() functions, resulting in a denial of service. (CVE-2013-4332)

- A distributed denial of service (DDoS) vulnerability exists in the NTP daemon due to improper handling of the 'monlist' command. A remote attacker can exploit this, via a forged request to an affected NTP server, to cause an amplified response to the intended target of the DDoS attack. (CVE-2013-5211)


Apply the appropriate patch according to the vendor advisory that pertains to ESX version 4.0 / 4.1 and ESXi version 4.0 / 4.1 / 5.0 / 5.1 / 5.5.

See Also



Plugin Details

Severity: Medium

ID: 87674

File Name: vmware_VMSA-2014-0002_remote.nasl

Version: 1.4

Type: remote

Family: Misc.

Published: 2015/12/30

Updated: 2018/08/06

Dependencies: 57396

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esx:4.0, cpe:/o:vmware:esx:4.1, cpe:/o:vmware:esxi:4.0, cpe:/o:vmware:esxi:4.1, cpe:/o:vmware:esxi:5.0, cpe:/o:vmware:esxi:5.1, cpe:/o:vmware:esxi:5.5

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/12/04

Vulnerability Publication Date: 2010/04/29

Reference Information

CVE: CVE-2013-4332, CVE-2013-5211

BID: 62324, 64692

VMSA: 2014-0002

CERT: 348126