Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
51554 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
14501 |
89674 |
CVE-2010-3081 |
10 |
Critical |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0003) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
components and libraries :
- Apache Tomcat
- Apache Tomcat Manager
- cURL
- Java Runtime Environment (JRE)
- Kernel
- Microsoft SQL Express
- OpenSSL
- pam_krb5 |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2011-0003
http://lists.vmware.com/pipermail/security-announce/2011/000140.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 360236 |
|
51899 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
14501 |
89743 |
CVE-2010-3081 |
7.2 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX Privilege Escalation (VMSA-2010-0017) (remote check) |
The remote VMware ESX host is missing a security-related patch. |
The remote VMware ESX host is missing a security-related patch. It is,
therefore, affected by a memory allocation issue in the Linux 64-bit
kernel due to a failure by the compat_alloc_user_space() function to
properly allocate the user space memory required for the 32-bit
compatibility layer. A local attacker can exploit this to gain
elevated privileges by leveraging the ability of the
compat_mc_getsockopt() function to control a certain length value. |
Apply the appropriate patch as referenced in the vendor advisory that
pertains to ESX version 4.0 / 4.1. |
http://lists.vmware.com/pipermail/security-announce/2011/000117.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 332073 |
|
57135 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
14501 |
89674 |
CVE-2010-3081 |
10 |
Critical |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0003) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
components and libraries :
- Apache Tomcat
- Apache Tomcat Manager
- cURL
- Java Runtime Environment (JRE)
- Kernel
- Microsoft SQL Express
- OpenSSL
- pam_krb5 |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2011-0003
http://lists.vmware.com/pipermail/security-announce/2011/000140.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 360236 |
|
57480 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
14501 |
89743 |
CVE-2010-3081 |
7.2 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX Privilege Escalation (VMSA-2010-0017) (remote check) |
The remote VMware ESX host is missing a security-related patch. |
The remote VMware ESX host is missing a security-related patch. It is,
therefore, affected by a memory allocation issue in the Linux 64-bit
kernel due to a failure by the compat_alloc_user_space() function to
properly allocate the user space memory required for the 32-bit
compatibility layer. A local attacker can exploit this to gain
elevated privileges by leveraging the ability of the
compat_mc_getsockopt() function to control a certain length value. |
Apply the appropriate patch as referenced in the vendor advisory that
pertains to ESX version 4.0 / 4.1. |
http://lists.vmware.com/pipermail/security-announce/2011/000117.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 332073 |
|