VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0010) (remote check)

High Nessus Plugin ID 89679

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.8

Synopsis

The remote VMware ESX host is missing a security-related patch.

Description

The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including arbitrary code execution vulnerabilities, in several third-party components and libraries :

- DHCP
- glibc

Solution

Apply the appropriate patch according to the vendor advisory that pertains to ESX version 3.5 / 4.0 / 4.1.

See Also

https://www.vmware.com/security/advisories/VMSA-2011-0010

http://lists.vmware.com/pipermail/security-announce/2012/000163.html

Plugin Details

Severity: High

ID: 89679

File Name: vmware_VMSA-2011-0010_remote.nasl

Version: 1.8

Type: remote

Family: Misc.

Published: 2016/03/04

Updated: 2019/09/24

Dependencies: 57396

Risk Information

Risk Factor: High

VPR Score: 6.8

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esx

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/07/28

Vulnerability Publication Date: 2010/04/22

Exploitable With

CANVAS (CANVAS)

Metasploit (glibc "$ORIGIN" Expansion Privilege Escalation)

Reference Information

CVE: CVE-2010-0296, CVE-2011-0536, CVE-2011-0997, CVE-2011-1071, CVE-2011-1095, CVE-2011-1658, CVE-2011-1659

BID: 44154, 46563, 47176, 47370

VMSA: 2011-0010

CERT: 537223, 107886