语言:
http://lists.vmware.com/pipermail/security-announce/2012/000197.html
严重性: Critical
ID: 61747
文件名: vmware_VMSA-2012-0013.nasl
版本: 1.57
类型: local
发布时间: 2012/8/31
最近更新时间: 2021/1/6
支持的传感器: Nessus
风险因素: Medium
分数: 6.7
风险因素: High
基本分数: 9.3
时间分数: 7.7
矢量: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
风险因素: Critical
基本分数: 9.1
时间分数: 8.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:vmware:esx:4.0, cpe:/o:vmware:esx:4.1, cpe:/o:vmware:esxi:4.1, cpe:/o:vmware:esxi:5.0
必需的 KB 项: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version
可利用: true
易利用性: Exploits are available
补丁发布日期: 2012/8/30
漏洞发布日期: 2010/6/1
Core Impact
Metasploit (Java Applet Field Bytecode Verifier Cache Remote Code Execution)
CVE: CVE-2009-5029, CVE-2009-5064, CVE-2010-0830, CVE-2010-2761, CVE-2010-4180, CVE-2010-4252, CVE-2010-4410, CVE-2011-0014, CVE-2011-1020, CVE-2011-1089, CVE-2011-1833, CVE-2011-2484, CVE-2011-2496, CVE-2011-2699, CVE-2011-3188, CVE-2011-3209, CVE-2011-3363, CVE-2011-3597, CVE-2011-4108, CVE-2011-4109, CVE-2011-4110, CVE-2011-4128, CVE-2011-4132, CVE-2011-4324, CVE-2011-4325, CVE-2011-4576, CVE-2011-4577, CVE-2011-4609, CVE-2011-4619, CVE-2012-0050, CVE-2012-0060, CVE-2012-0061, CVE-2012-0207, CVE-2012-0393, CVE-2012-0815, CVE-2012-0841, CVE-2012-0864, CVE-2012-1569, CVE-2012-1573, CVE-2012-1583, CVE-2012-2110
BID: 52011, 52012, 52013, 52014, 52015, 52016, 52017, 52018, 52019, 52020, 52107, 52161, 53950, 53951, 53952, 53953, 53954, 53956, 53958, 53959, 53960, 40063, 44199, 45145, 45163, 45164, 46264, 46567, 46740, 47321, 48383, 48802, 49108, 49289, 49626, 49911, 50311, 50609, 50663, 50755, 50798, 50898, 51194, 51257, 51281, 51343, 51366, 51439, 51467, 51563, 52009, 52010, 52201, 52667, 52668, 52865, 53136, 53139, 53158, 53946, 53947, 53948, 53949
VMSA: 2012-0013