Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310103495
HistoryJun 15, 2012 - 12:00 a.m.

VMware ESXi/ESX patches address security issues (VMSA-2012-0011)

2012-06-1500:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
16

6.6 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.1%

The remote ESXi is missing one or more security related Updates from VMSA-2012-0011.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103495");
  script_cve_id("CVE-2012-3288", "CVE-2012-3289");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_version("2023-07-25T05:05:58+0000");
  script_name("VMware ESXi/ESX patches address security issues (VMSA-2012-0011)");
  script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
  script_tag(name:"creation_date", value:"2012-06-15 10:02:01 +0100 (Fri, 15 Jun 2012)");
  script_category(ACT_GATHER_INFO);
  script_family("VMware Local Security Checks");
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_dependencies("gb_vmware_esxi_init.nasl");
  script_mandatory_keys("VMware/ESXi/LSC", "VMware/ESX/version");

  script_xref(name:"URL", value:"http://www.vmware.com/security/advisories/VMSA-2012-0011.html");

  script_tag(name:"solution", value:"Apply the missing patch(es).

  a. VMware Host Checkpoint file memory corruption

  Workaround - None identified

  Mitigation - Do not import virtual machines from untrusted sources.

  b. VMware Virtual Machine Remote Device Denial of Service

  Workaround - None identified

  Mitigation - Users need administrative privileges on the virtual machine in
  order to attach remote devices. - Do not attach untrusted remote devices to a
  virtual machine.");

  script_tag(name:"vuldetect", value:"Checks if the target host is missing one or more patch(es).");

  script_tag(name:"summary", value:"The remote ESXi is missing one or more security related Updates from VMSA-2012-0011.");

  script_tag(name:"affected", value:"ESXi 5.0 without patch ESXi500-201206401-SG

  ESXi 4.1 without patch ESXi410-201206401-SG

  ESXi 4.0 without patch ESXi400-201206401-SG

  ESXi 3.5 without patch ESXe350-201206401-I-SG

  ESX 4.1 without patch ESX410-201206401-SG

  ESX 4.0 without patch ESX400-201206401-SG

  ESX 3.5 without patch ESX350-201206401-SG");

  script_tag(name:"insight", value:"a. VMware Host Checkpoint file memory corruption

  Input data is not properly validated when loading Checkpoint files. This may
  allow an attacker with the ability to load a specially crafted Checkpoint file
  to execute arbitrary code on the host.

  b. VMware Virtual Machine Remote Device Denial of Service

  A device (e.g. CD-ROM, keyboard) that is available to a virtual machine while
  physically connected to a system that does not run the virtual machine is
  referred to as a remote device.

  Traffic coming from remote virtual devices is incorrectly handled. This may
  allow an attacker who is capable of manipulating the traffic from a remote
  virtual device to crash the virtual machine.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("vmware_esx.inc");
include("version_func.inc");

if(!get_kb_item("VMware/ESXi/LSC"))
  exit(0);

if(!esxVersion = get_kb_item("VMware/ESX/version"))
  exit(0);

patches = make_array("4.1.0", "ESXi410-201206401-SG",
                     "4.0.0", "ESXi400-201206401-SG",
                     "5.0.0", "VIB:esx-base:5.0.0-1.16.721882");

if(!patches[esxVersion])
  exit(99);

if(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

6.6 Medium

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.1%

Related for OPENVAS:1361412562310103495