SynopsisThe remote VMware ESXi host is missing a security-related patch.
DescriptionThe remote VMware ESXi host is affected by multiple vulnerabilities in the OpenSSL third-party library :
- A flaw exist in the Elliptic Curve Digital Signature Algorithm (ECDSA) implementation due to a failure to insure that certain swap operations have a constant-time behavior. An attacker can exploit this to obtain the ECDSA nonces by using a FLUSH+RELOAD cache side-channel attack. (CVE-2014-0076)
- An out-of-bounds read error, known as Heartbleed, exists in the TLS/DTLS implementation due to improper handling of TLS heartbeat extension packets. A remote attacker, using crafted packets, can trigger a buffer over-read, resulting in the disclosure of up to 64KB of process memory, which contains sensitive information such as primary key material, secondary key material, and other protected content. (CVE-2014-0160)
SolutionApply the appropriate patch according to the vendor advisory that pertains to ESXi version 5.5 / 5.5 U1. Additional remediation steps may also need to be performed after applying the patch.