copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2010.1055.2 - UPDATE [VMware ESX] VMWare: Multiple vulnerabilities

Date: 06 January 2011
References: ESB-2009.0330  ASB-2010.0057  ESB-2010.0253  ESB-2010.0264  ASB-2010.0222.2  ESB-2010.1083.2  ESB-2011.0010.4  ESB-2011.0167.3  
Related Files: ESB-2010.1055  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2010.1055.2
        VMware ESXi and ESX third party updates for Service Console
                          and Likewise components
                              6 January 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          VMware ESXi 4.1
                  VMware ESX 4.1
                  VMware ESX 4.0
Publisher:        VMWare
Operating System: VMWare ESX Server
Impact/Access:    Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                  Access Privileged Data          -- Remote/Unauthenticated
                  Denial of Service               -- Remote/Unauthenticated
                  Reduced Security                -- Unknown/Unspecified   
Resolution:       Patch/Upgrade
CVE Names:        CVE-2010-1437 CVE-2010-1321 CVE-2010-1088
                  CVE-2010-1087 CVE-2010-0622 CVE-2010-0415
                  CVE-2010-0307 CVE-2010-0291 CVE-2009-4212
                  CVE-2009-0846 CVE-2009-0845 CVE-2009-0844

Reference:        ESB-2010.1083
                  ASB-2010.0057
                  ESB-2010.0264
                  ESB-2010.0253
                  ESB-2009.0330
                  ASB-2010.0222.2

Revision History: January   6 2011: ESX 4.0 patches
                  November 17 2010: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2010-0016.1
Synopsis:          VMware ESXi and ESX third party updates for Service
                   Console and Likewise components
Issue date:        2010-11-15
Updated on:        2011-01-04
CVE numbers:       CVE-2010-0415 CVE-2010-0307 CVE-2010-0291
                   CVE-2010-0622 CVE-2010-1087 CVE-2010-1437
                   CVE-2010-1088 CVE-2009-0844 CVE-2009-0845
                   CVE-2009-0846 CVE-2009-4212 CVE-2010-1321
- - ------------------------------------------------------------------------

1. Summary

   ESX Service Console OS (COS) kernel update, and Likewise packages
   updates.

2. Relevant releases
   
   VMware ESXi 4.1 without patch ESXi410-201010401-SG

   VMware ESX 4.1 without patches ESX410-201010401-SG,
   ESX410-201010419-SG

   VMware ESX 4.0 without patch ESX400-201101401-SG

3. Problem Description

 a. Service Console OS update for COS kernel

    This patch updates the service console kernel to fix multiple
    security issues.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2010-0415, CVE-2010-0307,
    CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1437, and
    CVE-2010-1088 to these issues.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.1       ESX      ESX410-201010401-SG
    ESX            4.0       ESX      see VMSA-2010-0017.1 for details
    ESX            3.x       ESX      not applicable

  * hosted products are VMware Workstation, Player, ACE, Fusion.

 b. Likewise package updates

    Updates to the likewisekrb5, likewiseopenldap, likewiseopen,
    and pamkrb5 packages address several security issues.
 
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2009-0844, CVE-2009-0845,
    CVE-2009-0846, CVE-2009-4212, and CVE-2010-1321 to these issues.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           4.1       ESXi     ESXi410-201010401-SG
    ESXi           4.0       ESXi     not affected

    ESX            4.1       ESX      ESX410-201010419-SG
    ESX            4.0       ESX      not applicable
    ESX            3.x       ESX      not applicable

  * hosted products are VMware Workstation, Player, ACE, Fusion.

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   ESXi 4.1
   --------
   ESXi410-201010401-SG
   Download link: http://bit.ly/bb3xjV
   md5sum: 05f1049c7a595481cd682e92fe8d3285
   sha1sum: f6993c185f7d1cb971a4ae6e017e0246b8c25a76
   http://kb.vmware.com/kb/1027753
 
   ESX 4.1
   -------
   ESX410-201010001
   Download link: http://bit.ly/a3Ffw8
   md5sum: ff4435fd3c74764f064e047c6e5e7809
   sha1sum: 322981f4dbb9e5913c8f38684369444ff7e265b3
   http://kb.vmware.com/kb/1027027

   ESX410-201010001 contains the following security bulletins:
   ESX410-201010401-SG (COS kernel) | http://kb.vmware.com/kb/1027013
   ESX410-201010419-SG (Likewise)   | http://kb.vmware.com/kb/1027026
   ESX410-201010404-SG (NSS)        | http://kb.vmware.com/kb/1027016
   ESX410-201010409-SG (tar)        | http://kb.vmware.com/kb/1027019
   ESX410-201010412-SG (Perl)       | http://kb.vmware.com/kb/1027022
   ESX410-201010413-SG (cpio)       | http://kb.vmware.com/kb/1027023
   ESX410-201010410-SG (cURL)       | http://kb.vmware.com/kb/1027020
   ESX410-201010401-SG (vmkernel64,
                           VMX, CIM)| http://kb.vmware.com/kb/1027013
   ESX410-201010414-SG
             (vmware-esx-pam-config)| http://kb.vmware.com/kb/1027024
   ESX410-201010402-SG (GnuTLS, NSS,
                        and openSSL)| http://kb.vmware.com/kb/1027014

   ESX410-201010001 also contains the following non-security bulletins
   ESX410-201010405-BG ESX410-201010415-BG

   To install an individual bulletin use esxupdate with the -b option.

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0291
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321

- - ------------------------------------------------------------------------

6. Change log

2010-11-15  VMSA-2010-0016
Initial security advisory after release of patches for ESX 4.1
on 2010-11-15
2011-01-04  VMSA-2010-0016.1
Updated security advisory in conjunction with the release of patches
for ESX 4.0 on 2011-01-04

- - -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2010 VMware Inc.  All rights reserved.


- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNJBGxS2KysvBH1xkRAt2iAJ9WIZd1X3NMkOODf5OUrfH+Qz8xIQCfca83
f2ZtEscatmBKAuRrcuCz+aM=
=XfnL
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFNJQou/iFOrG6YcBERAp1oAJ0ZQV+dsxiyB9eyxeqT4NhD/FP8nQCgqIpi
WRZd0yNwPueWqmen08uUhGA=
=4E3v
-----END PGP SIGNATURE-----