VMSA-2016-0002 : VMware product updates address a critical glibc security vulnerability

Critical Nessus Plugin ID 88954


The remote VMware ESXi host is missing a security-related patch.


a. glibc update for multiple products.

The glibc library has been updated in multiple products to resolve a stack-based buffer overflow present in the glibc getaddrinfo function.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-7547.

VMware products have been grouped into the following four categories :
I) ESXi and ESX Hypervisor Versions of ESXi and ESX prior to 5.5 are not affected because they do not ship with a vulnerable version of glibc.
ESXi 5.5 and ESXi 6.0 ship with a vulnerable version of glibc and are affected. See table 1 for remediation for ESXi 5.5 and ESXi 6.0.
II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected.

III) VMware virtual appliances VMware virtual appliances ship with a vulnerable version of glibc and are affected. See table 2 for remediation for appliances.
IV) Products that run on Linux VMware products that run on Linux (excluding virtual appliances) might use a vulnerable version of glibc as part of the base operating system. If the operating system has a vulnerable version of glibc, VMware recommends that customers contact their operating system vendor for resolution. WORKAROUND

Workarounds are available for several virtual appliances. These are documented in VMware KB article 2144032.


VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. In case patches are not available, customers are advised to deploy the workaround.

Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available.

Table 1 - ESXi ==============


Apply the missing patch.

See Also



Plugin Details

Severity: Critical

ID: 88954

File Name: vmware_VMSA-2016-0002.nasl

Version: $Revision: 2.15 $

Type: local

Published: 2016/02/25

Modified: 2017/01/27

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.5, cpe:/o:vmware:esxi:6.0

Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/02/22

Reference Information

CVE: CVE-2015-7547

OSVDB: 134584

TRA: TRA-2017-08

IAVB: 2016-B-0036, 2016-B-0037

VMSA: 2016-0002