Vulnerability Name:

CVE-2016-5331 (CCN-115832)

Assigned:2016-08-04
Published:2016-08-04
Updated:2018-10-09
Summary:CRLF injection vulnerability in VMware vCenter Server 6.0 before U2 and ESXi 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
CVSS v3 Severity:6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-93
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2016-5331

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html

Source: FULLDISC
Type: UNKNOWN
20160805 [SYSS-2016-063] VMware ESXi 6 - Improper Input Validation (CWE-20)

Source: BUGTRAQ
Type: UNKNOWN
20160805 [SYSS-2016-063] VMware ESXi 6 - Improper Input Validation (CWE-20)

Source: BID
Type: UNKNOWN
92324

Source: CCN
Type: BID-92324
VMware vCenter Server and ESXi CVE-2016-5331 HTTP Header Injection Vulnerability

Source: SECTRACK
Type: UNKNOWN
1036543

Source: SECTRACK
Type: UNKNOWN
1036544

Source: SECTRACK
Type: UNKNOWN
1036545

Source: CCN
Type: VMware Security Advisory VMSA-2016-0010
VMware product updates address multiple security issues

Source: CONFIRM
Type: Mitigation, Patch, Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2016-0010.html

Source: XF
Type: UNKNOWN
vmware-cve20165331-header-injection(115832)

Source: CCN
Type: Packet Storm Security [08-05-2016]
VMware vSphere Hypervisor (ESXi) HTTP Response Injection

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:vcenter_server:*:update_1b:*:*:*:*:*:* (Version <= 6.0)
  • OR cpe:/o:vmware:esxi:6.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:vmware:esxi:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vcenter_server:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:vmware:esxi:5.5:*:*:*:*:*:*:*
  • OR cpe:/o:vmware:esxi:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:vcenter_server:6.0:-:*:*:*:*:*:*
  • OR cpe:/o:vmware:esxi:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware vcenter server * update_1b
    vmware esxi 6.0
    vmware esxi 5.0
    vmware vcenter server 5.0
    vmware esxi 5.5
    vmware esxi 5.1
    vmware vcenter server 6.0
    vmware esxi 6.0