Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   VMware ESXi Vendors:   VMware
VMware ESXi Server Header Injection Flaw Lets Remote Users Conduct Cross-Site Scripting and Redirect Attacks and DLL Loading Error Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1036544
SecurityTracker URL:
CVE Reference:   CVE-2016-5330, CVE-2016-5331   (Links to External Site)
Updated:  Aug 5 2016
Original Entry Date:  Aug 5 2016
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.0, 5.1, 5.5, 6.0
Description:   Two vulnerabilities were reported in VMware ESXi Server. A remote user can execute arbitrary code on the target system. A remote user can conduct cross-site scripting and open redirect attacks.

A remote user can create a specially crafted DLL file on a remote network share. When the target user opens a document from their local system, the application may load the remote user's DLL instead of the intended DLL and execute arbitrary code [CVE-2016-5330].

This type of exploit is also known as "binary planting" or "DLL preloading".

Yorick Koster of Securify B.V. reported this vulnerability.

The software does not properly validate user-supplied input. A remote user can set arbitrary HTTP response headers and cookies to conduct cross-site scripting and open redirect attacks [CVE-2016-5331].

Vladimir Ivanov, Andrey Evlanin, Mikhail Stepankin, Artem Kondratenko, Arseniy Sharoglazov of Positive Technologies, Matt Foster of Netcraft Ltd, Matthias Deeg of SySS GmbH, Eva Esteban Molina of A2secure, and Ammarit Thongthua independently reported this vulnerability.

Impact:   A remote user can conduct cross-site scripting and open redirect attacks.

A remote user can cause the target application to execute arbitrary code on the target user's system.

Solution:   The vendor has issued a fix.

For 6.0: ESXi600-201603102-SG, ESXi600-201603101-SG
For 5.5: ESXi550-201607102-SG
For 5.1: ESXi510-201605102-SG
For 5.0: ESXi500-201606102-SG

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC