VMware ESX Privilege Escalation (VMSA-2010-0017) (remote check)

high Nessus Plugin ID 89743


The remote VMware ESX host is missing a security-related patch.


The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by a memory allocation issue in the Linux 64-bit kernel due to a failure by the compat_alloc_user_space() function to properly allocate the user space memory required for the 32-bit compatibility layer. A local attacker can exploit this to gain elevated privileges by leveraging the ability of the compat_mc_getsockopt() function to control a certain length value.


Apply the appropriate patch as referenced in the vendor advisory that pertains to ESX version 4.0 / 4.1.

See Also


Plugin Details

Severity: High

ID: 89743

File Name: vmware_VMSA-2010-0017_remote.nasl

Version: 1.5

Type: remote

Published: 3/8/2016

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Critical

Score: 9.5


Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:vmware:esx

Required KB Items: Host/VMware/release, Host/VMware/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/29/2010

Vulnerability Publication Date: 9/16/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-3081

BID: 43239

VMSA: 2010-0017