VMware ESXi Multiple DoS (VMSA-2014-0008)
Medium Nessus Plugin ID 87679
SynopsisThe remote VMware ESXi host is missing a security-related patch.
DescriptionThe remote ESXi host is affected by multiple denial of service vulnerabilities in the glibc library :
- A buffer overflow condition exists in the extend_buffers() function in file posix/regexec.c due to improper validation of user-supplied input when handling multibyte characters in a regular expression. An unauthenticated, remote attacker can exploit this, via a crafted regular expression, to corrupt the memory, resulting in a denial of service. (CVE-2013-0242)
- A stack-based buffer overflow condition exists in the getaddrinfo() function in file posix/getaddrinfo.c due to improper validation of user-supplied input during the handling of domain conversion results. An unauthenticated, remote attacker can exploit this to cause a denial of service by using a crafted host name or IP address that triggers a large number of domain conversion results. (CVE-2013-1914)
SolutionApply the appropriate patch according to the vendor advisory that pertains to ESXi version 5.0 / 5.1 / 5.5.