コード例 #1
0
ファイル: VMSA-2010-0001.1.py プロジェクト: uvbs/Scanner
<br>
Service Console updates for OpenSSL to version 097a-0.9.7a-9.el5_4.2
and version 0.9.8e-12.el5_4.6, GnuTLS to version 1.4.1-3.el5_4.8,
and NSS to version 3.12.6-1.3235.vmw and NSPR to version
4.8.4-1.3235.vmw. These four updates are bundled together due to
their mutual dependencies.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-3555, CVE-2009-2409, CVE-2009-3245
and CVE-2010-0433 to the issues addressed in this update.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0001.html"

flag = 0

if ESX_check('ESX 4.0', 'ESX400-201009401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201009407-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201009408-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201009409-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201009410-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201010402-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201010404-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201010410-SG'):
    flag += 1
コード例 #2
0
<br>
kpartx updated to 0.4.7-23.el5_3.4, libvolume-id updated to
095-14.20.el5 device-mapper-multipath package updated to
0.4.7-23.el5_3.4, fipscheck updated to 1.0.3-1.el5, dbus
updated to 1.1.2-12.el5, dbus-libs updated to 1.1.2-12.el5,
and ed package updated to 0.2-39.el5_2.
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2008-3916, CVE-2009-1189 and
CVE-2009-0115 to these issues.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0004.html"

flag = 0

if ESX_check('ESX 3.5.0', 'ESX350-201006407-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201008406-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201002404-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201002406-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201002407-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005403-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005404-SG'):
    flag += 1

if flag:
コード例 #3
0
ファイル: VMSA-2011-0012.3.py プロジェクト: uvbs/Scanner
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-0296, CVE-2011-0536, CVE-2011-1071,
CVE-2011-1095, CVE-2011-1658, and CVE-2011-1659 to these issues.
<br>
d. ESX update to third party drivers mptsas, mpt2sas, and mptspi
<br>
The mptsas, mpt2sas, and mptspi drivers are updated which addresses
multiple security issues in the mpt2sas driver.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2011-1494 and CVE-2011-1495 to these issues.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"

flag = 0
if ESX_check('ESX 3.5.0', 'ESX350-201203403-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201110401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201110403-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201110409-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201110201-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201110224-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #4
0
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0426 to this issue.
<br>
When the runas_default option is used, sudo does not properly set
group memberships, which allows local users to gain privileges via
a sudo command.
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0427 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0009.html"

flag = 0

if ESX_check('ESX 3.5.0', 'ESX350-201006405-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201006406-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201006408-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005405-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005406-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005407-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005408-SG'):
    flag += 1
コード例 #5
0
ESXi 4.1 Update 1
ESXi 4.0 with patch ESXi400-201103402-SG
<br>
ESX 4.1 Update 1
ESX 4.0 with patch ESX400-201103401-SG
<br>
An install or update of the vSphere Client from these releases will
not present a security warning from Windows.
Note: typically the vSphere Client will request an update if the
existing client is pointed at a newer version of vCenter or ESX.
<br>
VMware Knowledge Base article 1021404 explains how the unsigned
install package can be obtained in an alternative, secure way for an
environment with VirtualCenter 2.5, ESXi/ESX 3.5 or ESX 3.0.3.
<br>
VMware would like to thank Claudio Criscione for reporting this
issue to us.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2011-1789 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0008.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201103401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #6
0
ファイル: VMSA-2010-0018.py プロジェクト: uvbs/Scanner
required to play back movies recorded with VMware Workstation,
VMware Player and VMware ACE, in any compatible media player. The
movie decoder is installed as part of VMware Workstation, VMware
Player and VMware ACE, or can be downloaded as a stand alone
package.
<br>
A function in the decoder frame decompression routine implicitly
trusts a size value.  An attacker can utilize this to miscalculate
a destination pointer, leading to the corruption of a heap buffer,
and could allow for execution of arbitrary code with the privileges
of the user running an application utilizing the vulnerable codec.
<br>
For an attack to be successful the user must be tricked into
visiting a malicious web page or opening a malicious video file on
a system that has the vulnerable version of the VMnc codec installed.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-4294 to this issue.
<br>
VMware would like to thank Aaron Portnoy and Logan Brown of
TippingPoint DVLabs for reporting this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0018.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201009401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #7
0
ファイル: VMSA-2011-0009.3.py プロジェクト: uvbs/Scanner
is not affected. This is any build of vSphere Client Version
4.0.0 and vSphere Client Version 4.1.0.
<br>
VI Clients bundled with VMware Infrastructure 3 that are not
affected are :
- VI Client 2.0.2 Build 230598 and higher
- VI Client 2.5 Build 204931 and higher
<br>
The issue can be remediated by replacing an affected VI Client
with the VI Client bundled with VirtualCenter 2.5 Update 6 or
VirtualCenter 2.5 Update 6a.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0009.html"

flag = 0
if ESX_check('ESX 3.5.0', 'ESX350-201105401-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201105404-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201105406-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201104401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201110410-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201104401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201110225-SG'):
    flag += 1

if flag:
コード例 #8
0
samba-client-3.0.33-3.15.el5_4.1 and
samba-common-3.0.33-3.15.el5_4.1. These versions include fixes for
security issues that were first fixed in
samba-client-3.0.33-0.18.el4_8 and samba-common-3.0.33-0.18.el4_8.
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-2906, CVE-2009-1888,CVE-2009-2813
and CVE-2009-2948 to these issues.
<br>
b. Service Console update for acpid to1.0.4-9.el5_4.2
<br>
This updates changes the the acpid package to acpid-1.0.4-9.el5_4.2.
This version includes the fix for a security issue that was first
fixed in acpid-1.0.4-7.el5_4.1.  
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-0798 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0006.html"

flag = 0

if ESX_check('ESX 4.0', 'ESX400-201003403-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201003405-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #9
0
ファイル: VMSA-2010-0013.3.py プロジェクト: uvbs/Scanner
<br>
The service console package perl is updated to version
5.8.0-101.EL3 for ESX 3.x versions and version 5.8.8-32.el5_5.1
for ESX 4.x versions.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-1168 and CVE-2010-1447 to the issues
addressed in the update for ESX 3.x and the names CVE-2008-5302,
CVE-2008-5303, CVE-2010-1168, and CVE-2010-1447 to the issues
addressed in the update for ESX 4.x.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0013.html"

flag = 0

if ESX_check('ESX 3.0.3', 'ESX303-201102402-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201008405-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201008407-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201008410-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201008411-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201008412-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201009402-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201009403-SG'):
    flag += 1
コード例 #10
0
ファイル: VMSA-2012-0001.2.py プロジェクト: uvbs/Scanner
assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and
CVE-2011-1521 to these issues.
<br>
g. ESXi update to third party component python
<br>
The python third party library is updated to python 2.5.6 which
fixes multiple security issues.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,
CVE-2010-2089, and CVE-2011-1521 to these issues.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2012-0001.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201203401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201203402-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201203403-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201203404-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201203405-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201201401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201201402-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201201404-SG'):
    flag += 1
コード例 #11
0
ファイル: VMSA-2010-0017.1.py プロジェクト: uvbs/Scanner
sys.path.append('.')

from scanFunction.vuln_check import ESX_check
from scanFunction.vuln_check import write_result
import re

VMSA = "VMSA-2010-0017.1"
name = "VMSA-2010-0017.1 : VMware ESX third party update for Service Console kernel"
cve_id = "CVE-2010-0291, CVE-2010-0307, CVE-2010-0415, CVE-2010-0622, CVE-2010-1087, CVE-2010-1088, CVE-2010-1437, CVE-2010-3081"
description = """a. Service Console OS update for COS kernel package.
<br>
This patch updates the Service Console kernel to fix a stack
pointer underflow issue in the 32-bit compatibility layer.
<br>
Exploitation of this issue could allow a local user to gain
additional privileges.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-3081 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0017.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201101401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201011402-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #12
0
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-1084, CVE-2010-2066, CVE-2010-2070,
CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, CVE-2010-2524,
CVE-2010-0008, CVE-2010-0415, CVE-2010-0437, CVE-2009-4308,
CVE-2010-0003, CVE-2010-0007, CVE-2010-0307, CVE-2010-1086,
CVE-2010-0410, CVE-2010-0730, CVE-2010-1085, CVE-2010-0291,
CVE-2010-0622, CVE-2010-1087, CVE-2010-1173, CVE-2010-1437,
CVE-2010-1088, CVE-2010-1187, CVE-2010-1436, CVE-2010-1641, and
CVE-2010-3081 to the issues addressed in the update.
<br>
Notes :
- The update also addresses the 64-bit compatibility mode
stack pointer underflow issue identified by CVE-2010-3081. This
issue was patched in an ESX 4.1 patch prior to the release of
ESX 4.1 Update 1 and in a previous ESX 4.0 patch release.
- The update also addresses CVE-2010-2240 for ESX 4.0.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201103401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201103403-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201101201-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #13
0
<br>
This release resolves an integer overflow issue present in the
third party library SFCB when the httpMaxContentLength has been
changed from its default value to 0 in in /etc/sfcb/sfcb.cfg.
The integer overflow could allow remote attackers to cause a
denial of service (heap memory corruption) or possibly execute
arbitrary code via a large integer in the Content-Length HTTP
header.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-2054 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0013.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201111201-SG'):
    flag += 1;
if ESX_check('ESX 4.0', 'ESX400-201203401-SG'):
    flag += 1;
if ESX_check('ESX 4.0', 'ESX400-201203406-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201110201-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201110204-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201110206-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201110214-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201110201-SG'):
    flag += 1;
コード例 #14
0
ファイル: VMSA-2011-0004.3.py プロジェクト: uvbs/Scanner
has assigned the names CVE-2010-3316, CVE-2010-3435, and
CVE-2010-3853 to these issues.
<br>
d. Service Console update for rpm, rpm-libs, rpm-python, and popt
<br>
This patch updates rpm, rpm-libs, and rpm-python RPMs to
4.4.2.3-20.el5_5.1, and popt to version 1.10.2.3-20.el5_5.1,
which resolves a security issue.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-2059 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0004.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201103401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201103404-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201103406-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201103407-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201101201-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201104407-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201110207-SG'):
    flag += 1

if flag:
コード例 #15
0
ファイル: VMSA-2012-0009.2.py プロジェクト: uvbs/Scanner
devices. The VMware hardening guides recommend removing unused
virtual IO devices in general.
<br>
Mitigation
<br>
- Do not allow untrusted root users access to your virtual
machines.  Root or Administrator level permissions are
required to exploit this issue.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-2450 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2012-0009.html"

flag = 0
if ESX_check('ESX 3.5.0', 'ESX350-201205401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201105201-UG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201205401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201110201-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201201401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201205401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
   # return "Patches in %s is missing!!\n" % VMSA
コード例 #16
0
virtual machine is referred to as a remote device.
<br>
Traffic coming from remote virtual devices is incorrectly handled.
This may allow an attacker who is capable of manipulating the
traffic from a remote virtual device to crash the virtual machine.
<br>
Workaround
- None identified
<br>
Mitigation
- Users need administrative privileges on the virtual machine
in order to attach remote devices.
- Do not attach untrusted remote devices to a virtual machine.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-3289 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2012-0011.html"

flag = 0
if ESX_check('ESX 3.5.0', 'ESX350-201206401-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201206401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201206401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #17
0
The service console package sudo is updated to version
1.7.2p1-8.el5_5.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-2956 to the issue addressed in this
update.
<br>
c. Service Console update for openldap
<br>
The service console package openldap is updated to version
2.3.43-12.el5_5.1.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-0211 and CVE-2010-0212 to the issues
addressed in this update.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0001.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201101404-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201101405-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201101226-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201104404-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #18
0
ファイル: VMSA-2010-0002.4.py プロジェクト: uvbs/Scanner
CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, and CVE-2009-1107.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the following names to the security issues fixed in
JRE 1.5.0_20: CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,
CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676,
CVE-2009-2716, CVE-2009-2718, CVE-2009-2719, CVE-2009-2720,
CVE-2009-2721, CVE-2009-2722, CVE-2009-2723, CVE-2009-2724.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the following names to the security issues fixed in
JRE 1.5.0_22: CVE-2009-3728, CVE-2009-3729, CVE-2009-3864,
CVE-2009-3865, CVE-2009-3866, CVE-2009-3867, CVE-2009-3868,
CVE-2009-3869, CVE-2009-3871, CVE-2009-3872, CVE-2009-3873,
CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877,
CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882,
CVE-2009-3883, CVE-2009-3884, CVE-2009-3886, CVE-2009-3885.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0002.html"

flag = 0

if ESX_check('ESX 3.5.0', 'ESX350-201003403-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201005402-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #19
0
<br>
The ESX Service Console Operating System (COS) kernel is updated
which addresses several security issues in the COS kernel.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2011-3191, CVE-2011-4348 and CVE-2012-0028 to
these issues.
<br>
b. Updated ESX Service Console package libxml2
<br>
The ESX Console Operating System (COS) libxml2 rpms are updated to
the following versions libxml2-2.6.26-2.1.12.el5_7.2 and
libxml2-python-2.6.26-2.1.12.el5_7.2 which addresses several
security issues.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-4008, CVE-2011-0216, CVE-2011-1944,
CVE-2011-2834, CVE-2011-3905, CVE-2011-3919 to these issues.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2012-0008.html"

flag = 0
if ESX_check('ESX 4.1', 'ESX410-201204401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201204402-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
   # return "Patches in %s is missing!!\n" % VMSA
コード例 #20
0
<br>
b. Service Console update for glibc
<br>
This patch updates the glibc package for ESX service console to
glibc-2.5-58.7602.vmw. This fixes multiple security issues in
glibc, glibc-common and nscd including possible local privilege
escalation.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifiers CVE-2010-0296, CVE-2011-0536,
CVE-2011-1095, CVE-2011-1071, CVE-2011-1658 and CVE-2011-1659 to
these issues.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2011-0010.html"

flag = 0
if ESX_check('ESX 3.5.0', 'ESX350-201203405-SG'):
    flag += 1;
if ESX_check('ESX 4.0', 'ESX400-201110406-SG'):
    flag += 1;
if ESX_check('ESX 4.0', 'ESX400-201110408-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201107405-SG'):
    flag += 1;
if ESX_check('ESX 4.1', 'ESX410-201107406-SG'):
    flag += 1;

if flag:
    write_result(name, cve_id, description, repair)
   # return "Patches in %s is missing!!\n" % VMSA
コード例 #21
0
ファイル: VMSA-2010-0007.1.py プロジェクト: uvbs/Scanner
<br>
VMware would like to thank Johann MacDonagh for reporting this
issue to us.
<br>
i. Linux-based vmrun format string vulnerability
<br>
A format string vulnerability in vmrun could allow arbitrary code
execution.
<br>
If a vmrun command is issued and processes are listed, code could
be executed in the context of the user listing the processes.
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-1139 to this issue.
<br>
VMware would like to thank Thomas Toth-Steiner for reporting this
issue to us.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0007.html"

flag = 0

if ESX_check('ESX 3.0.3', 'ESX303-201002203-UG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-200911223-UG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #22
0
ファイル: VMSA-2010-0019.3.py プロジェクト: uvbs/Scanner
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-0405 to this issue.
<br>
c. Service Console update for OpenSSL
<br>
The service console package openssl updated to version
0.9.7a-33.26.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-0590, CVE-2009-2409 and
CVE-2009-3555 to the issues addressed in this update.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0019.html"

flag = 0
if ESX_check('ESX 3.0.3', 'ESX303-201102402-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201012401-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201012408-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201012409-SG'):
    flag += 1
if ESX_check('ESX 4.0', 'ESX400-201103405-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201104403-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #23
0
<br>
This patch updates the service console package for net-snmp,
net-snmp-utils, and net-snmp-libs to version
net-snmp-5.0.9-2.30E.28. This net-snmp update fixes a divide-by-
zero flaw in the snmpd daemon. A remote attacker could issue a
specially crafted GETBULK request that could cause the snmpd daemon
to fail.
<br>
This vulnerability was introduced by an incorrect fix for
CVE-2008-4309.
<br>
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has
assigned the name CVE-2009-1887 to this issue.
<br>
Note: After installing the previous patch for net-snmp
(ESX350-200901409-SG), running the snmpbulkwalk command with the
parameter -CnX results in no output, and the snmpd daemon stops.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0003.html"

flag = 0

if ESX_check('ESX 3.0.3', 'ESX303-201002202-SG'):
    flag += 1
if ESX_check('ESX 3.5.0', 'ESX350-201002401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #24
0
import sys

sys.path.append('.')

from scanFunction.vuln_check import ESX_check
from scanFunction.vuln_check import write_result
import re

VMSA = "VMSA-2012-0003"
name = "VMSA-2012-0003 : VMware VirtualCenter Update and ESX 3.5 patch update JRE"
cve_id = "CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556, CVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561"
description = """a. VirtualCenter and ESX, Oracle (Sun) JRE update 1.5.0_32
<br>
Oracle (Sun) JRE is updated to version 1.5.0_32, which addresses
multiple security issues that existed in earlier releases of Oracle
(Sun) JRE.
<br>
Oracle has documented the CVE identifiers that are addressed in
JRE 1.5.0_32 in the Oracle Java SE Critical Patch Update Advisory of
October 2011.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2012-0003.html"

flag = 0
if ESX_check('ESX 3.5.0', 'ESX350-201203401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #25
0
ファイル: VMSA-2012-0005.2.py プロジェクト: uvbs/Scanner
provides a link to this advisory.
<br>
f. vCenter Server Apache Tomcat update 6.0.35
<br>
Apache Tomcat has been updated to version 6.0.35 to address
multiple security issues.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2011-3190, CVE-2011-3375, and
CVE-2012-0022 to these issues.
<br>
g. ESXi update to third party component bzip2
<br>
The bzip2 library is updated to version 1.0.6, which resolves a
security issue.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-0405 to this issue.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2012-0005.html"

flag = 0
if ESX_check('ESX 4.0', 'ESX400-201110401-SG'):
    flag += 1
if ESX_check('ESX 4.1', 'ESX410-201110201-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA
コード例 #26
0
ファイル: VMSA-2010-0010.py プロジェクト: uvbs/Scanner
from scanFunction.vuln_check import ESX_check
from scanFunction.vuln_check import write_result
import re

VMSA = "VMSA-2010-0010"
name = "VMSA-2010-0010 : ESX 3.5 third party update for Service Console kernel"
cve_id = "CVE-2008-5029, CVE-2008-5300, CVE-2009-1337, CVE-2009-1385, CVE-2009-1895, CVE-2009-2692, CVE-2009-2698, CVE-2009-2848, CVE-2009-3002, CVE-2009-3547"
description = """a. Service Console update for COS kernel
<br>
The service console package kernel is updated to version 2.4.21-63.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2008-5029, CVE-2008-5300, CVE-2009-1337,
CVE-2009-1385, CVE-2009-1895, CVE-2009-2848, CVE-2009-3002, and
CVE-2009-3547 to the security issues fixed in kernel-2.4.21-63.
<br>
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-2698, CVE-2009-2692 to the security
issues fixed in kernel-2.4.21-60.
"""
repair = "http://www.vmware.com/security/advisories/VMSA-2010-0010.html"

flag = 0

if ESX_check('ESX 3.5.0', 'ESX350-201006401-SG'):
    flag += 1

if flag:
    write_result(name, cve_id, description, repair)
# return "Patches in %s is missing!!\n" % VMSA