ESXi 5.5 < Build 3568722 / 6.0 < Build 3568940 glibc DNS Resolver RCE (VMSA-2016-0002) (remote check)

high Nessus Plugin ID 88906

Synopsis

The remote VMware ESXi host is affected by a remote code execution vulnerability.

Description

The remote VMware ESXi host is 5.5 prior to build 3568722 or 6.0 prior to build 3568940. It is, therefore, affected by a stack-based buffer overflow condition in the GNU C Library (glibc) DNS client-side resolver due to improper validation of user-supplied input when looking up names via the getaddrinfo() function. An attacker can exploit this to execute arbitrary code by using an attacker-controlled domain name, an attacker-controlled DNS server, or through a man-in-the-middle attack.

Solution

Apply the appropriate patch as referenced in the vendor advisory.

See Also

http://www.vmware.com/security/advisories/VMSA-2016-0002.html

http://kb.vmware.com/kb/2144353

http://kb.vmware.com/kb/2144357

http://kb.vmware.com/kb/2144057

http://kb.vmware.com/kb/2144054

http://www.nessus.org/u?8bdae0a0

https://sourceware.org/bugzilla/show_bug.cgi?id=18665

Plugin Details

Severity: High

ID: 88906

File Name: vmware_VMSA-2016-0002_remote.nasl

Version: 1.16

Type: remote

Family: Misc.

Published: 2/23/2016

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-7547

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:vmware:esxi

Required KB Items: Host/VMware/release, Host/VMware/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/21/2016

Vulnerability Publication Date: 7/14/2015

Reference Information

CVE: CVE-2015-7547

BID: 83265

CERT: 457759

VMSA: 2016-0002