Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
7521 |
H28-MOJ-Online-Nara-16-seg-1-20161126-soga_ubl064.csv |
28092 |
88906 |
CVE-2015-7547 |
10 |
Critical |
172.27.137.67 |
tcp |
0 |
ESXi 5.5 < Build 3568722 / 6.0 < Build 3568940 glibc DNS Resolver RCE (VMSA-2016-0002) (remote check) |
The remote VMware ESXi host is affected by a remote code execution
vulnerability. |
The remote VMware ESXi host is 5.5 prior to build 3568722 or 6.0
prior to build 3568940. It is, therefore, affected by a stack-based
buffer overflow condition in the GNU C Library (glibc) DNS client-side
resolver due to improper validation of user-supplied input when
looking up names via the getaddrinfo() function. An attacker can
exploit this to execute arbitrary code by using an attacker-controlled
domain name, an attacker-controlled DNS server, or through a
man-in-the-middle attack. |
Apply the appropriate patch as referenced in the vendor advisory. |
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
http://kb.vmware.com/kb/2144353
http://kb.vmware.com/kb/2144357
http://kb.vmware.com/kb/2144057
http://kb.vmware.com/kb/2144054
http://www.nessus.org/u?8bdae0a0
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 |
ESXi version : 5.5 Installed build : 2403361 Fixed build : 3568722 |
|
30877 |
H28-MOJ-Online-Funa-12-seg-v1-161103.csv |
28092 |
88906 |
CVE-2015-7547 |
10 |
Critical |
172.27.9.67 |
tcp |
0 |
ESXi 5.5 < Build 3568722 / 6.0 < Build 3568940 glibc DNS Resolver RCE (VMSA-2016-0002) (remote check) |
The remote VMware ESXi host is affected by a remote code execution
vulnerability. |
The remote VMware ESXi host is 5.5 prior to build 3568722 or 6.0
prior to build 3568940. It is, therefore, affected by a stack-based
buffer overflow condition in the GNU C Library (glibc) DNS client-side
resolver due to improper validation of user-supplied input when
looking up names via the getaddrinfo() function. An attacker can
exploit this to execute arbitrary code by using an attacker-controlled
domain name, an attacker-controlled DNS server, or through a
man-in-the-middle attack. |
Apply the appropriate patch as referenced in the vendor advisory. |
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
http://kb.vmware.com/kb/2144353
http://kb.vmware.com/kb/2144357
http://kb.vmware.com/kb/2144057
http://kb.vmware.com/kb/2144054
http://www.nessus.org/u?8bdae0a0
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 |
ESXi version : 5.5 Installed build : 2403361 Fixed build : 3568722 |
|
52133 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
28092 |
88906 |
CVE-2015-7547 |
10 |
Critical |
172.16.240.150 |
tcp |
0 |
ESXi 5.5 < Build 3568722 / 6.0 < Build 3568940 glibc DNS Resolver RCE (VMSA-2016-0002) (remote check) |
The remote VMware ESXi host is affected by a remote code execution
vulnerability. |
The remote VMware ESXi host is 5.5 prior to build 3568722 or 6.0
prior to build 3568940. It is, therefore, affected by a stack-based
buffer overflow condition in the GNU C Library (glibc) DNS client-side
resolver due to improper validation of user-supplied input when
looking up names via the getaddrinfo() function. An attacker can
exploit this to execute arbitrary code by using an attacker-controlled
domain name, an attacker-controlled DNS server, or through a
man-in-the-middle attack. |
Apply the appropriate patch as referenced in the vendor advisory. |
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
http://kb.vmware.com/kb/2144353
http://kb.vmware.com/kb/2144357
http://kb.vmware.com/kb/2144057
http://kb.vmware.com/kb/2144054
http://www.nessus.org/u?8bdae0a0
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 |
ESXi version : 5.5 Installed build : 1892794 Fixed build : 3568722 |
|
57703 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
28092 |
88906 |
CVE-2015-7547 |
10 |
Critical |
172.16.240.150 |
tcp |
0 |
ESXi 5.5 < Build 3568722 / 6.0 < Build 3568940 glibc DNS Resolver RCE (VMSA-2016-0002) (remote check) |
The remote VMware ESXi host is affected by a remote code execution
vulnerability. |
The remote VMware ESXi host is 5.5 prior to build 3568722 or 6.0
prior to build 3568940. It is, therefore, affected affected by a
stack-based buffer overflow condition in the GNU C Library (glibc) DNS
client-side resolver due to improper validation of user-supplied input
when looking up names via the getaddrinfo() function. An attacker can
exploit this to execute arbitrary code by using an attacker-controlled
domain name, an attacker-controlled DNS server, or through a
man-in-the-middle attack. |
Apply the appropriate patch as referenced the vendor advisories. |
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
http://kb.vmware.com/kb/2144353
http://kb.vmware.com/kb/2144357
http://kb.vmware.com/kb/2144057
http://kb.vmware.com/kb/2144054
http://www.nessus.org/u?8bdae0a0
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 |
ESXi version : 5.5 Installed build : 1892794 Fixed build : 3568722 |
|