SynopsisThe remote VMware ESX host is missing a security-related patch.
DescriptionThe remote VMware ESX host is affected by multiple vulnerabilities in the Bash shell :
- A command injection vulnerability exists in GNU Bash known as Shellshock. The vulnerability is due to the processing of trailing strings after function definitions in the values of environment variables. This allows a remote attacker to execute arbitrary code via environment variable manipulation depending on the configuration of the system. (CVE-2014-6271, CVE-2014-7169, CVE-2014-6277, CVE-2014-6278)
- A out-of-bounds read error exists in the redirection implementation in file parse.y when evaluating untrusted input during stacked redirects handling. A remote attacker can exploit this to cause a denial of service or possibly have other unspecified impact.
- An off-by-one overflow condition exists in the read_token_word() function in file parse.y when handling deeply nested flow control structures. A remote attacker can exploit this, by using deeply nested for-loops, to cause a denial of service or possibly execute arbitrary code. (CVE-2014-7187)
SolutionApply the appropriate patch according to the vendor advisory that pertains to ESX version 4.0 / 4.1.
File Name: vmware_VMSA-2014-0010_remote.nasl
Temporal Vector: E:H/RL:OF/RC:C
CPE: cpe:/o:vmware:esx:4.0, cpe:/o:vmware:esx:4.1
Required KB Items: Host/VMware/version, Host/VMware/release
Exploit Ease: Exploits are available
Patch Publication Date: 10/17/2014
Vulnerability Publication Date: 9/24/2014
CISA Known Exploited Dates: 7/28/2022
Metasploit (CUPS Filter Bash Environment Variable Code Injection (Shellshock))
CVE: CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187
BID: 70103, 70137, 70152, 70154, 70165, 70166