Rapid7 Vulnerability & Exploit Database

VMSA-2011-0012: ESXi and ESX update to third party component glibc (CVE-2011-1071)

Back to Search

VMSA-2011-0012: ESXi and ESX update to third party component glibc (CVE-2011-1071)

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
04/08/2011
Created
07/25/2018
Added
10/20/2011
Modified
02/13/2015

Description

The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.

Solution(s)

  • vmware-esx40-upgrade-480973
  • vmware-esx41-upgrade-502767
  • vmware-esxi40-upgrade-480973
  • vmware-esxi41-upgrade-502767
  • vmware-esxi50-upgrade-515841

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;