Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
51377 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
37620 |
89662 |
CVE-2013-1406 |
7.2 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi VMCI Privilege Escalation (VMSA-2013-0002) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by a privilege escalation vulnerability in
the Virtual Machine Communication Interface (VMCI) due to improper
handling of control code in vmci.sys. A local attacker can exploit
this to change memory allocation, resulting in an escalation of
privileges on Windows-based guest operating systems.
Note that systems with VMCI disabled are still affected by the
vulnerability. |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2013-0002 |
Version : ESX 4.0 Installed build : 208167 Fixed build : 989856 |
|
51989 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
37620 |
89662 |
CVE-2013-1406 |
7.2 |
High |
172.16.240.131 |
tcp |
443 |
VMware ESX / ESXi VMCI Privilege Escalation (VMSA-2013-0002) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by a privilege escalation vulnerability in
the Virtual Machine Communication Interface (VMCI) due to improper
handling of control code in vmci.sys. A local attacker can exploit
this to change memory allocation, resulting in an escalation of
privileges on Windows-based guest operating systems.
Note that systems with VMCI disabled are still affected by the
vulnerability. |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2013-0002 |
Version : ESXi 4.1 Installed build : 800380 Fixed build : 874690 |
|
56958 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
37620 |
89662 |
CVE-2013-1406 |
7.2 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi VMCI Privilege Escalation (VMSA-2013-0002) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by a privilege escalation vulnerability in
the Virtual Machine Communication Interface (VMCI) due to improper
handling of control code in vmci.sys. A local attacker can exploit
this to change memory allocation, resulting in an escalation of
privileges on Windows-based guest operating systems.
Note that systems with VMCI disabled are still affected by the
vulnerability. |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2013-0002 |
Version : ESX 4.0 Installed build : 208167 Fixed build : 989856 |
|
57565 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
37620 |
89662 |
CVE-2013-1406 |
7.2 |
High |
172.16.240.131 |
tcp |
443 |
VMware ESX / ESXi VMCI Privilege Escalation (VMSA-2013-0002) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by a privilege escalation vulnerability in
the Virtual Machine Communication Interface (VMCI) due to improper
handling of control code in vmci.sys. A local attacker can exploit
this to change memory allocation, resulting in an escalation of
privileges on Windows-based guest operating systems.
Note that systems with VMCI disabled are still affected by the
vulnerability. |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2013-0002 |
Version : ESXi 4.1 Installed build : 800380 Fixed build : 874690 |
|