Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310103457
HistoryMar 16, 2012 - 12:00 a.m.

VMware ESXi/ESX patches address several security issues (VMSA-2012-0005)

2012-03-1600:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
24

6.8 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.059 Low

EPSS

Percentile

93.3%

The remote ESXi is missing one or more security related Updates from VMSA-2012-0005.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103457");
  script_cve_id("CVE-2012-1508", "CVE-2012-1509", "CVE-2012-1510", "CVE-2012-1512", "CVE-2012-1513", "CVE-2012-1514", "CVE-2011-3190", "CVE-2011-3375", "CVE-2012-0022", "CVE-2010-0405");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_version("2023-07-25T05:05:58+0000");
  script_name("VMware ESXi/ESX patches address several security issues (VMSA-2012-0005)");
  script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
  script_tag(name:"creation_date", value:"2012-03-16 16:53:01 +0100 (Fri, 16 Mar 2012)");
  script_category(ACT_GATHER_INFO);
  script_family("VMware Local Security Checks");
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_dependencies("gb_vmware_esxi_init.nasl");
  script_mandatory_keys("VMware/ESXi/LSC", "VMware/ESX/version");

  script_xref(name:"URL", value:"http://www.vmware.com/security/advisories/VMSA-2012-0005.html");

  script_tag(name:"solution", value:"Apply the missing patch(es).");

  script_tag(name:"vuldetect", value:"Checks if the target host is missing one or more patch(es).");

  script_tag(name:"summary", value:"The remote ESXi is missing one or more security related Updates from VMSA-2012-0005.");

  script_tag(name:"affected", value:"ESXi 5.0 without patches ESXi500-201203101-SG, ESXi500-201112402-BG

  ESXi 4.1 without patch ESXi410-201110202-UG

  ESXi 4.0 without patch ESXi400-201110402-BG

  ESX 4.1 without patch ESX410-201110201-SG

  ESX 4.0 without patch ESX400-201110401-SG");

  script_tag(name:"insight", value:"a. VMware Tools Display Driver Privilege Escalation

  The VMware XPDM and WDDM display drivers contain buffer overflow vulnerabilities and the XPDM display
  driver does not properly check for NULL pointers. Exploitation of these issues may lead to local privilege
  escalation on Windows-based Guest Operating Systems.

  b. vSphere Client internal browser input validation vulnerability

  The vSphere Client has an internal browser that renders html pages from log file entries. This browser doesn't
  properly sanitize input and may run script that is introduced into the log files. In order for the script to
  run, the user would need to open an individual, malicious log file entry. The script would run with the
  permissions of the user that runs the vSphere Client.

  c. vCenter Orchestrator Password Disclosure

  The vCenter Orchestrator (vCO) Web Configuration tool reflects back the vCenter Server password as part of the
  webpage. This might allow the logged-in vCO administrator to retrieve the vCenter Server password.

  d. vShield Manager Cross-Site Request Forgery vulnerability

  The vShield Manager (vSM) interface has a Cross-Site Request Forgery vulnerability. If an attacker can convince
  an authenticated user to visit a malicious link, the attacker may force the victim to forward an authenticated
  request to the server.

  e. vCenter Update Manager, Oracle (Sun) JRE update 1.6.0_30

  Oracle (Sun) JRE is updated to version 1.6.0_30, which addresses multiple security issues that existed in earlier
  releases of Oracle (Sun) JRE.

  f. vCenter Server Apache Tomcat update 6.0.35

  Apache Tomcat has been updated to version 6.0.35 to address multiple security issues.

  g. ESXi update to third party component bzip2

  The bzip2 library is updated to version 1.0.6, which resolves a security issue.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("vmware_esx.inc");
include("version_func.inc");

if(!get_kb_item("VMware/ESXi/LSC"))
  exit(0);

if(!esxVersion = get_kb_item("VMware/ESX/version"))
  exit(0);

patches = make_array("4.0.0", "ESXi400-201110402-BG",
                     "4.1.0", "ESXi410-201110202-UG",
                     "5.0.0", "VIB:esx-base:5.0.0-0.10.608089");

if(!patches[esxVersion])
  exit(99);

if(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

6.8 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.059 Low

EPSS

Percentile

93.3%