Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310105133
HistoryDec 05, 2014 - 12:00 a.m.

VMware ESXi product updates address security vulnerabilities (VMSA-2014-0012)

2014-12-0500:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
11

8 High

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.046 Low

EPSS

Percentile

92.4%

VMware vSphere product updates address a Cross Site Scripting issue, a certificate validation
issue and security vulnerabilities in third-party libraries.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105133");
  script_cve_id("CVE-2014-3797", "CVE-2014-8371", "CVE-2013-2877", "CVE-2014-0191", "CVE-2014-0015",
                "CVE-2014-0138", "CVE-2013-1752", "CVE-2013-4238");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:N");
  script_version("2023-07-27T05:05:08+0000");
  script_name("VMware ESXi product updates address security vulnerabilities (VMSA-2014-0012)");
  script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
  script_tag(name:"creation_date", value:"2014-12-05 11:31:51 +0100 (Fri, 05 Dec 2014)");
  script_category(ACT_GATHER_INFO);
  script_family("VMware Local Security Checks");
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_dependencies("gb_vmware_esxi_init.nasl");
  script_mandatory_keys("VMware/ESXi/LSC", "VMware/ESX/version");

  script_xref(name:"URL", value:"http://www.vmware.com/security/advisories/VMSA-2014-0012.html");

  script_tag(name:"vuldetect", value:"Checks if the target host is missing one or more patch(es).");

  script_tag(name:"insight", value:"a. VMware vCSA cross-site scripting vulnerability
  VMware vCenter Server Appliance (vCSA) contains a vulnerability that may
  allow for Cross Site Scripting. Exploitation of this vulnerability in
  vCenter Server requires tricking a user to click on a malicious link or
  to open a malicious web page while they are logged in into vCenter.

  b. vCenter Server certificate validation issue
  vCenter Server does not properly validate the presented certificate
  when establishing a connection to a CIM Server residing on an ESXi
  host. This may allow for a Man-in-the-middle attack against the CIM
  service.

  c. Update to ESXi libxml2 package
  libxml2 is updated to address multiple security issues.

  d. Update to ESXi Curl package
  Curl is updated to address multiple security issues.

  e. Update to ESXi Python package
  Python is updated to address multiple security issues.

  f. vCenter and Update Manager, Oracle JRE 1.6 Update 81

  Oracle has documented the CVE identifiers that are addressed in JRE
  1.6.0 update 81 in the Oracle Java SE Critical Patch Update Advisory of July 2014.");

  script_tag(name:"solution", value:"Apply the missing patch(es).");

  script_tag(name:"summary", value:"VMware vSphere product updates address a Cross Site Scripting issue, a certificate validation
  issue and security vulnerabilities in third-party libraries.");

  script_tag(name:"affected", value:"VMware ESXi 5.1 without patch ESXi510-201412101-SG.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("vmware_esx.inc");
include("version_func.inc");

if(!get_kb_item("VMware/ESXi/LSC"))
  exit(0);

if(!esxVersion = get_kb_item("VMware/ESX/version"))
  exit(0);

patches = make_array("5.1.0", "VIB:esx-base:5.1.0-3.50.2323231");

if(!patches[esxVersion])
  exit(99);

if(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

8 High

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.046 Low

EPSS

Percentile

92.4%