VMware ESXi Multiple DoS (VMSA-2014-0008)

Medium Nessus Plugin ID 87679


The remote VMware ESXi host is missing a security-related patch.


The remote ESXi host is affected by multiple denial of service vulnerabilities in the glibc library :

- A buffer overflow condition exists in the extend_buffers() function in file posix/regexec.c due to improper validation of user-supplied input when handling multibyte characters in a regular expression. An unauthenticated, remote attacker can exploit this, via a crafted regular expression, to corrupt the memory, resulting in a denial of service. (CVE-2013-0242)

- A stack-based buffer overflow condition exists in the getaddrinfo() function in file posix/getaddrinfo.c due to improper validation of user-supplied input during the handling of domain conversion results. An unauthenticated, remote attacker can exploit this to cause a denial of service by using a crafted host name or IP address that triggers a large number of domain conversion results. (CVE-2013-1914)


Apply the appropriate patch according to the vendor advisory that pertains to ESXi version 5.0 / 5.1 / 5.5.

See Also



Plugin Details

Severity: Medium

ID: 87679

File Name: vmware_VMSA-2014-0008_remote.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 2015/12/30

Updated: 2018/08/06

Dependencies: 57396

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.0, cpe:/o:vmware:esxi:5.1, cpe:/o:vmware:esxi:5.5

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/12/04

Vulnerability Publication Date: 2013/01/29

Reference Information

CVE: CVE-2013-0242, CVE-2013-1914

BID: 57638, 58839

VMSA: 2014-0008