VMware ESX Privilege Escalation (VMSA-2010-0017) (remote check)

High Nessus Plugin ID 89743


The remote VMware ESX host is missing a security-related patch.


The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by a memory allocation issue in the Linux 64-bit kernel due to a failure by the compat_alloc_user_space() function to properly allocate the user space memory required for the 32-bit compatibility layer. A local attacker can exploit this to gain elevated privileges by leveraging the ability of the compat_mc_getsockopt() function to control a certain length value.


Apply the appropriate patch as referenced in the vendor advisory that pertains to ESX version 4.0 / 4.1.

See Also


Plugin Details

Severity: High

ID: 89743

File Name: vmware_VMSA-2010-0017_remote.nasl

Version: 1.4

Type: remote

Published: 2016/03/08

Updated: 2018/08/06

Dependencies: 57396

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esx

Required KB Items: Host/VMware/version, Host/VMware/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/11/29

Vulnerability Publication Date: 2010/09/16

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-3081

BID: 43239

VMSA: 2010-0017