Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
7522 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.27.137.67 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 5.5 Installed build : 2403361 Fixed build : 4179633 / 4179631 (security-only fix) |
|
17379 |
H28-MOJ-Teikyo-Nara-16-Seg-1-20161128-Endo_cwc04s.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.200.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
17424 |
H28-MOJ-Teikyo-Nara-16-Seg-1-20161128-Endo_cwc04s.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.200.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
17477 |
H28-MOJ-Teikyo-Nara-16-Seg-2-20161128-Endo_a4yi4b.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.200.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
18031 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.201.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
18194 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.201.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
18308 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.201.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
30878 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.27.9.67 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 5.5 Installed build : 2403361 Fixed build : 4179633 / 4179631 (security-only fix) |
|
41411 |
H28-MOJ-Teikyo-Yokohama-17-seg-01-21161121-abe_beidq4.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.136.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
41464 |
H28-MOJ-Teikyo-Yokohama-17-seg-02-21161121-abe_2jyjw7.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.136.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
41509 |
H28-MOJ-Teikyo-Yokohama-17-seg-02-21161121-abe_2jyjw7.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.136.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
42098 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.138.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
42259 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.138.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
42339 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.30.138.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
52134 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
20620 |
92949 |
CVE-2016-5330 |
9.3 |
High |
172.16.240.150 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 5.5 Installed build : 1892794 Fixed build : 4179633 / 4179631 (security-only fix) |
|