Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
7523 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.27.137.67 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 5.5 Installed build : 2403361 Fixed build : 4179633 / 4179631 (security-only fix) |
|
17380 |
H28-MOJ-Teikyo-Nara-16-Seg-1-20161128-Endo_cwc04s.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.200.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
17425 |
H28-MOJ-Teikyo-Nara-16-Seg-1-20161128-Endo_cwc04s.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.200.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
17478 |
H28-MOJ-Teikyo-Nara-16-Seg-2-20161128-Endo_a4yi4b.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.200.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
18032 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.201.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
18195 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.201.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
18309 |
H28-MOJ-Teikyo-Nara-17-seg-1-20161128-w510.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.201.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
20829 |
H28-MOJ-Teikyo-Nara-17-seg-2-20161128-w510.csv |
20621 |
92870 |
CVE-2016-5331 |
5 |
Medium |
172.30.201.69 |
tcp |
443 |
VMware vCenter Server 6.0.x < 6.0u2 Unspecified HTTP Header Injection (VMSA-2016-0010) |
A virtualization management application installed on the remote host
is affected by an HTTP header injection vulnerability. |
The version of VMware vCenter Server installed on the remote host is
6.0.x prior to 6.0u2. It is, therefore, affected by an HTTP header
injection vulnerability due to improper sanitization of user-supplied
input. A remote attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks. |
Upgrade to VMware vCenter Server version 6.0u2 (6.0.0 build-3634788)
or later. |
https://www.vmware.com/security/advisories/VMSA-2016-0010.html |
Installed version : 6.0.0 build-3018524 Fixed version : 6.0.0 build-3634788 |
|
30879 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.27.9.67 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 5.5 Installed build : 2403361 Fixed build : 4179633 / 4179631 (security-only fix) |
|
41412 |
H28-MOJ-Teikyo-Yokohama-17-seg-01-21161121-abe_beidq4.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.136.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
41465 |
H28-MOJ-Teikyo-Yokohama-17-seg-02-21161121-abe_2jyjw7.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.136.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
41510 |
H28-MOJ-Teikyo-Yokohama-17-seg-02-21161121-abe_2jyjw7.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.136.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
42099 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.138.20 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
42260 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.138.21 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
42340 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.30.138.22 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 6.0 Installed build : 3568940 Fixed build : 3620759 / 3568943 (security-only fix) |
|
43913 |
H28-MOJ-Teikyo-Yokohama-18-seg-01-21161121-abe_ubh1mj.csv |
20621 |
92870 |
CVE-2016-5331 |
5 |
Medium |
172.30.138.69 |
tcp |
443 |
VMware vCenter Server 6.0.x < 6.0u2 Unspecified HTTP Header Injection (VMSA-2016-0010) |
A virtualization management application installed on the remote host
is affected by an HTTP header injection vulnerability. |
The version of VMware vCenter Server installed on the remote host is
6.0.x prior to 6.0u2. It is, therefore, affected by an HTTP header
injection vulnerability due to improper sanitization of user-supplied
input. A remote attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks. |
Upgrade to VMware vCenter Server version 6.0u2 (6.0.0 build-3634788)
or later. |
https://www.vmware.com/security/advisories/VMSA-2016-0010.html |
Installed version : 6.0.0 build-3018524 Fixed version : 6.0.0 build-3634788 |
|
52135 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
20621 |
92949 |
CVE-2016-5331 |
9.3 |
High |
172.16.240.150 |
tcp |
0 |
ESXi 5.0 < Build 3982828 / 5.1 < Build 3872664 / 5.5 < Build 4179633 / 6.0 < Build 3620759 Multiple Vulnerabilities (VMSA-2016-0010) (remote check) |
The remote VMware ESXi host is affected by multiple vulnerabilities. |
The remote VMware ESXi host is 5.0 prior to build 3982828, 5.1 prior
to build 3872664, 5.5 prior to build 4179633, or 6.0 prior to build
3620759. It is, therefore, affected by multiple vulnerabilities :
- An arbitrary code execution vulnerability exists in the
Shared Folders (HGFS) feature due to improper loading of
Dynamic-link library (DLL) files from insecure paths,
including the current working directory, which may not
be under user control. A remote attacker can exploit
this vulnerability, by placing a malicious DLL in the
path or by convincing a user into opening a file on a
network share, to inject and execute arbitrary code in
the context of the current user. (CVE-2016-5330)
- An HTTP header injection vulnerability exists due to
improper sanitization of user-supplied input. A remote
attacker can exploit this to inject arbitrary HTTP
headers and conduct HTTP response splitting attacks.
(CVE-2016-5331) |
Apply the appropriate patch as referenced in the vendor advisory.
Note that VMware Tools on Windows-based guests that use the Shared
Folders (HGFS) feature must also be updated to completely mitigate
CVE-2016-5330. |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html
http://kb.vmware.com/kb/2142193
http://kb.vmware.com/kb/2143976
http://kb.vmware.com/kb/2141429
http://kb.vmware.com/kb/2144359 |
ESXi version : 5.5 Installed build : 1892794 Fixed build : 4179633 / 4179631 (security-only fix) |
|