Language:
http://lists.vmware.com/pipermail/security-announce/2012/000197.html
Severity: Critical
ID: 61747
File Name: vmware_VMSA-2012-0013.nasl
Version: 1.57
Type: local
Family: VMware ESX Local Security Checks
Published: 8/31/2012
Updated: 1/6/2021
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.7
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Risk Factor: Critical
Base Score: 9.1
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:vmware:esx:4.0, cpe:/o:vmware:esx:4.1, cpe:/o:vmware:esxi:4.1, cpe:/o:vmware:esxi:5.0
Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/30/2012
Vulnerability Publication Date: 6/1/2010
Core Impact
Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)
CVE: CVE-2009-5029, CVE-2009-5064, CVE-2010-0830, CVE-2010-2761, CVE-2010-4180, CVE-2010-4252, CVE-2010-4410, CVE-2011-0014, CVE-2011-1020, CVE-2011-1089, CVE-2011-1833, CVE-2011-2484, CVE-2011-2496, CVE-2011-2699, CVE-2011-3188, CVE-2011-3209, CVE-2011-3363, CVE-2011-3597, CVE-2011-4108, CVE-2011-4109, CVE-2011-4110, CVE-2011-4128, CVE-2011-4132, CVE-2011-4324, CVE-2011-4325, CVE-2011-4576, CVE-2011-4577, CVE-2011-4609, CVE-2011-4619, CVE-2012-0050, CVE-2012-0060, CVE-2012-0061, CVE-2012-0207, CVE-2012-0393, CVE-2012-0815, CVE-2012-0841, CVE-2012-0864, CVE-2012-1569, CVE-2012-1573, CVE-2012-1583, CVE-2012-2110
BID: 50755, 50798, 50898, 51194, 51257, 51281, 51343, 51366, 51439, 51467, 51563, 52009, 52010, 52011, 52012, 52013, 52014, 52015, 52016, 52017, 52018, 52019, 52020, 52107, 52161, 53950, 53951, 53952, 53953, 53954, 53956, 53958, 53959, 53960, 40063, 44199, 45145, 45163, 45164, 46264, 46567, 46740, 47321, 48383, 48802, 49108, 49289, 49626, 49911, 50311, 50609, 50663, 52201, 52667, 52668, 52865, 53136, 53139, 53158, 53946, 53947, 53948, 53949
VMSA: 2012-0013