VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0011) (remote check)

high Nessus Plugin ID 89036


The remote VMware ESX / ESXi host is missing a security-related patch.


The remote VMware ESX / ESXi host is affected by multiple vulnerabilities :

- A remote code execution vulnerability exists due to improper sanitization of user-supplied input. A remote attacker can exploit this, via a specially crafted checkpoint file, to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code on the host OS. (CVE-2012-3288)

- A denial of service vulnerability exists due to improper handling of traffic originating from mobile virtual devices. A remote attacker can exploit this to crash the guest OS. (CVE-2012-3289)


Apply the appropriate patch according to the vendor advisory that pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 / 4.1 / 5.0.

See Also


Plugin Details

Severity: High

ID: 89036

File Name: vmware_VMSA-2012-0011_remote.nasl

Version: 1.4

Type: remote

Family: Misc.

Published: 2/29/2016

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:vmware:esx, cpe:/o:vmware:esxi

Required KB Items: Host/VMware/release, Host/VMware/version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/14/2012

Vulnerability Publication Date: 6/14/2012

Reference Information

CVE: CVE-2012-3288, CVE-2012-3289

BID: 53996

VMSA: 2012-0011