Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
51170 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
29905 |
87673 |
CVE-2014-1207 |
4.3 |
Medium |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Multiple DoS (VMSA-2014-0001) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is affected by multiple denial of
service vulnerabilities :
- A denial of service vulnerability exists due to a NULL
pointer deference flaw when handling Network File Copy
(NFC) traffic. An unauthenticated, remote attacker can
exploit this by intercepting and modifying the traffic
between the ESX / ESXi host and the client.
(CVE-2014-1207)
- A flaw exists due to improper handling of invalid
ports. An unauthenticated attacker on an adjacent
network can exploit this to cause VMX processing to
fail, resulting in a partial denial of service.
(CVE-2014-1208) |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 and ESXi version 4.0 / 4.1 / 5.0 /
5.1. |
https://www.vmware.com/security/advisories/VMSA-2014-0001
http://lists.vmware.com/pipermail/security-announce/2014/000231.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 1335992 |
|
51965 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
29905 |
87673 |
CVE-2014-1207 |
4.3 |
Medium |
172.16.240.131 |
tcp |
443 |
VMware ESX / ESXi Multiple DoS (VMSA-2014-0001) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is affected by multiple denial of
service vulnerabilities :
- A denial of service vulnerability exists due to a NULL
pointer deference flaw when handling Network File Copy
(NFC) traffic. An unauthenticated, remote attacker can
exploit this by intercepting and modifying the traffic
between the ESX / ESXi host and the client.
(CVE-2014-1207)
- A flaw exists due to improper handling of invalid
ports. An unauthenticated attacker on an adjacent
network can exploit this to cause VMX processing to
fail, resulting in a partial denial of service.
(CVE-2014-1208) |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 and ESXi version 4.0 / 4.1 / 5.0 /
5.1. |
https://www.vmware.com/security/advisories/VMSA-2014-0001
http://lists.vmware.com/pipermail/security-announce/2014/000231.html |
Version : ESXi 4.1 Installed build : 800380 Fixed build : 1363503 |
|
56751 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
29905 |
87673 |
CVE-2014-1207 |
4.3 |
Medium |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Multiple DoS (VMSA-2014-0001) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is affected by multiple denial of
service vulnerabilities :
- A denial of service vulnerability exists due to a NULL
pointer deference flaw when handling Network File Copy
(NFC) traffic. An unauthenticated, remote attacker can
exploit this by intercepting and modifying the traffic
between the ESX / ESXi host and the client.
(CVE-2014-1207)
- A flaw exists due to improper handling of invalid
ports. An unauthenticated attacker on an adjacent
network can exploit this to cause VMX processing to
fail, resulting in a partial denial of service.
(CVE-2014-1208) |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 and ESXi version 4.0 / 4.1 / 5.0 /
5.1. |
https://www.vmware.com/security/advisories/VMSA-2014-0001
http://lists.vmware.com/pipermail/security-announce/2014/000231.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 1335992 |
|
57541 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
29905 |
87673 |
CVE-2014-1207 |
4.3 |
Medium |
172.16.240.131 |
tcp |
443 |
VMware ESX / ESXi Multiple DoS (VMSA-2014-0001) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is affected by multiple denial of
service vulnerabilities :
- A denial of service vulnerability exists due to a NULL
pointer deference flaw when handling Network File Copy
(NFC) traffic. An unauthenticated, remote attacker can
exploit this by intercepting and modifying the traffic
between the ESX / ESXi host and the client.
(CVE-2014-1207)
- A flaw exists due to improper handling of invalid
ports. An unauthenticated attacker on an adjacent
network can exploit this to cause VMX processing to
fail, resulting in a partial denial of service.
(CVE-2014-1208) |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 and ESXi version 4.0 / 4.1 / 5.0 /
5.1. |
https://www.vmware.com/security/advisories/VMSA-2014-0001
http://lists.vmware.com/pipermail/security-announce/2014/000231.html |
Version : ESXi 4.1 Installed build : 800380 Fixed build : 1363503 |
|