Lucene search

K
openvasCopyright (C) 2015 Greenbone Networks GmbHOPENVAS:1361412562310105393
HistoryOct 05, 2015 - 12:00 a.m.

VMware ESXi OpenSLP Remote Code Execution (VMSA-2015-0007)

2015-10-0500:00:00
Copyright (C) 2015 Greenbone Networks GmbH
plugins.openvas.org
726

0.971 High

EPSS

Percentile

99.7%

VMware vCenter and ESXi updates address critical security issues.

###############################################################################
# OpenVAS Vulnerability Test
#
# VMSA-2015-0007: VMware ESXi OpenSLP Remote Code Execution
#
# Authors:
# Michael Meyer <[email protected]>
#
# Copyright:
# Copyright (c) 2015 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105393");
  script_cve_id("CVE-2015-5177", "CVE-2015-2342", "CVE-2015-1047");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_version("2019-12-18T11:13:08+0000");
  script_name("VMware ESXi OpenSLP Remote Code Execution (VMSA-2015-0007)");

  script_xref(name:"URL", value:"http://www.vmware.com/security/advisories/VMSA-2015-0007.html");

  script_tag(name:"vuldetect", value:"Checks if the target host is missing one or more patch(es).");

  script_tag(name:"insight", value:"- VMware ESXi OpenSLP Remote Code Execution

  VMware ESXi contains a double free flaw in OpenSLP's SLPDProcessMessage() function. Exploitation of
  this issue may allow an unauthenticated attacker to execute code remotely on the ESXi host.

  - VMware vCenter Server JMX RMI Remote Code Execution

  VMware vCenter Server contains a remotely accessible JMX RMI service that is not securely configured.
  An unauthenticated remote attacker that is able to connect to the service may be able use it to execute
  arbitrary code on the vCenter server.

  - VMware vCenter Server vpxd denial-of-service vulnerability

  VMware vCenter Server does not properly sanitize long heartbeat messages. Exploitation of this issue may
  allow an unauthenticated attacker to create a denial-of-service condition in the vpxd service.");

  script_tag(name:"solution", value:"Apply the missing patch(es).");

  script_tag(name:"summary", value:"VMware vCenter and ESXi updates address critical security issues.");

  script_tag(name:"affected", value:"VMware ESXi 5.5 without patch ESXi550-201509101

  VMware ESXi 5.1 without patch ESXi510-201510101

  VMware ESXi 5.0 without patch ESXi500-201510101");

  script_tag(name:"last_modification", value:"2019-12-18 11:13:08 +0000 (Wed, 18 Dec 2019)");
  script_tag(name:"creation_date", value:"2015-10-05 10:37:34 +0200 (Mon, 05 Oct 2015)");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  script_category(ACT_GATHER_INFO);
  script_family("VMware Local Security Checks");
  script_copyright("Copyright (C) 2015 Greenbone Networks GmbH");
  script_dependencies("gb_vmware_esxi_init.nasl");
  script_mandatory_keys("VMware/ESXi/LSC", "VMware/ESX/version");

  exit(0);
}

include("vmware_esx.inc");
include("version_func.inc");

if(!get_kb_item("VMware/ESXi/LSC"))
  exit(0);

if(!esxVersion = get_kb_item("VMware/ESX/version"))
  exit(0);

patches = make_array("5.0.0", "VIB:esx-base:5.0.0-3.70.3088986",
                     "5.1.0", "VIB:esx-base:5.1.0-3.57.3021178",
                     "5.5.0", "VIB:esx-base:5.5.0-2.65.3029837");

if(!patches[esxVersion])
  exit(99);

if(report = esxi_patch_missing(esxi_version:esxVersion, patch:patches[esxVersion])) {
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

0.971 High

EPSS

Percentile

99.7%