Lucene search

K
nessusThis script is (C) 2014-2018 Tenable Network Security, Inc.VMWARE_ESXI_5_5_BUILD_2068190_REMOTE.NASL
HistoryOct 09, 2014 - 12:00 a.m.

ESXi 5.5 < Build 1980513 glibc Library Multiple Vulnerabilities (remote check)

2014-10-0900:00:00
This script is (C) 2014-2018 Tenable Network Security, Inc.
www.tenable.com
31

The remote VMware ESXi host is version 5.5 prior to build 1980513. It is, therefore, affected by the following vulnerabilities in the glibc library :

  • A buffer overflow flaw exists in the ‘extend_buffers’ function of the ‘posix/regexec.c’ file, due to not properly validating user input. Using a specially crafted expression, a remote attacker can cause a denial of service. (CVE-2013-0242)

  • A buffer overflow flaw exists in the ‘getaddrinfo’ function of the ‘/sysdeps/posix/getaddrinfo.c’ file, due to not properly validating user input. A remote attacker can cause a denial of service by triggering a large number of domain conversions. (CVE-2013-1914)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(78108);
  script_version("1.6");
  script_cvs_date("Date: 2018/08/06 14:03:15");

  script_cve_id("CVE-2013-0242", "CVE-2013-1914");
  script_bugtraq_id(57638, 58839);
  script_xref(name:"VMSA", value:"2014-0008");

  script_name(english:"ESXi 5.5 < Build 1980513 glibc Library Multiple Vulnerabilities (remote check)");
  script_summary(english:"Checks the ESXi version and build number.");

  script_set_attribute(attribute:"synopsis", value:
"The remote VMware ESXi 5.5 host is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote VMware ESXi host is version 5.5 prior to build 1980513. It
is, therefore, affected by the following vulnerabilities in the glibc
library :

  - A buffer overflow flaw exists in the 'extend_buffers'
    function of the 'posix/regexec.c' file, due to not
    properly validating user input. Using a specially
    crafted expression, a remote attacker can cause a
    denial of service. (CVE-2013-0242)

  - A buffer overflow flaw exists in the 'getaddrinfo'
    function of the '/sysdeps/posix/getaddrinfo.c' file,
    due to not properly validating user input. A remote
    attacker can cause a denial of service by triggering
    a large number of domain conversions. (CVE-2013-1914)");
  script_set_attribute(attribute:"see_also", value:"http://lists.vmware.com/pipermail/security-announce/2014/000260.html");
  script_set_attribute(attribute:"solution", value:"Apply patch ESXi550-201409101-SG for ESXi 5.5.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/09/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/09");

  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is (C) 2014-2018 Tenable Network Security, Inc.");
  script_family(english:"Misc.");

  script_dependencies("vmware_vsphere_detect.nbin");
  script_require_keys("Host/VMware/version", "Host/VMware/release");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

ver = get_kb_item_or_exit("Host/VMware/version");
rel = get_kb_item_or_exit("Host/VMware/release");

if ("ESXi" >!< rel) audit(AUDIT_OS_NOT, "ESXi");
if ("VMware ESXi 5.5" >!< rel) audit(AUDIT_OS_NOT, "ESXi 5.5");

match = eregmatch(pattern:'^VMware ESXi.*build-([0-9]+)$', string:rel);
if (isnull(match)) exit(1, 'Failed to extract the ESXi build number.');

build       = int(match[1]);
fixed_build = 1980513;

if (build < fixed_build)
{
  if (report_verbosity > 0)
  {
    report = '\n  ESXi version    : ' + ver +
             '\n  Installed build : ' + build +
             '\n  Fixed build     : ' + fixed_build +
             '\n';
    security_warning(port:0, extra:report);
  }
  else security_warning(0);
}
else audit(AUDIT_INST_VER_NOT_VULN, "VMware ESXi", ver - "ESXi " + " build " + build);
VendorProductVersionCPE
vmwareesxicpe:/o:vmware:esxi