VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0011) (remote check)

High Nessus Plugin ID 89036


The remote VMware ESX / ESXi host is missing a security-related patch.


The remote VMware ESX / ESXi host is affected by multiple vulnerabilities :

- A remote code execution vulnerability exists due to improper sanitization of user-supplied input. A remote attacker can exploit this, via a specially crafted checkpoint file, to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code on the host OS. (CVE-2012-3288)

- A denial of service vulnerability exists due to improper handling of traffic originating from mobile virtual devices. A remote attacker can exploit this to crash the guest OS. (CVE-2012-3289)


Apply the appropriate patch according to the vendor advisory that pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 / 4.1 / 5.0.

See Also


Plugin Details

Severity: High

ID: 89036

File Name: vmware_VMSA-2012-0011_remote.nasl

Version: 1.3

Type: remote

Family: Misc.

Published: 2016/02/29

Updated: 2018/08/06

Dependencies: 57396

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esx, cpe:/o:vmware:esxi

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/06/14

Vulnerability Publication Date: 2012/06/14

Reference Information

CVE: CVE-2012-3288, CVE-2012-3289

BID: 53996

VMSA: 2012-0011