Date: 06 January 2011
References: ESB-2009.0330 ASB-2010.0057 ESB-2010.0253 ESB-2010.0264 ASB-2010.0222.2 ESB-2010.1083.2 ESB-2011.0010.4 ESB-2011.0167.3
Related Files:
ESB-2010.1055
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2010.1055.2
VMware ESXi and ESX third party updates for Service Console
and Likewise components
6 January 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: VMware ESXi 4.1
VMware ESX 4.1
VMware ESX 4.0
Publisher: VMWare
Operating System: VMWare ESX Server
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Access Privileged Data -- Remote/Unauthenticated
Denial of Service -- Remote/Unauthenticated
Reduced Security -- Unknown/Unspecified
Resolution: Patch/Upgrade
CVE Names: CVE-2010-1437 CVE-2010-1321 CVE-2010-1088
CVE-2010-1087 CVE-2010-0622 CVE-2010-0415
CVE-2010-0307 CVE-2010-0291 CVE-2009-4212
CVE-2009-0846 CVE-2009-0845 CVE-2009-0844
Reference: ESB-2010.1083
ASB-2010.0057
ESB-2010.0264
ESB-2010.0253
ESB-2009.0330
ASB-2010.0222.2
Revision History: January 6 2011: ESX 4.0 patches
November 17 2010: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2010-0016.1
Synopsis: VMware ESXi and ESX third party updates for Service
Console and Likewise components
Issue date: 2010-11-15
Updated on: 2011-01-04
CVE numbers: CVE-2010-0415 CVE-2010-0307 CVE-2010-0291
CVE-2010-0622 CVE-2010-1087 CVE-2010-1437
CVE-2010-1088 CVE-2009-0844 CVE-2009-0845
CVE-2009-0846 CVE-2009-4212 CVE-2010-1321
- - ------------------------------------------------------------------------
1. Summary
ESX Service Console OS (COS) kernel update, and Likewise packages
updates.
2. Relevant releases
VMware ESXi 4.1 without patch ESXi410-201010401-SG
VMware ESX 4.1 without patches ESX410-201010401-SG,
ESX410-201010419-SG
VMware ESX 4.0 without patch ESX400-201101401-SG
3. Problem Description
a. Service Console OS update for COS kernel
This patch updates the service console kernel to fix multiple
security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-0415, CVE-2010-0307,
CVE-2010-0291, CVE-2010-0622, CVE-2010-1087, CVE-2010-1437, and
CVE-2010-1088 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201010401-SG
ESX 4.0 ESX see VMSA-2010-0017.1 for details
ESX 3.x ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
b. Likewise package updates
Updates to the likewisekrb5, likewiseopenldap, likewiseopen,
and pamkrb5 packages address several security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-0844, CVE-2009-0845,
CVE-2009-0846, CVE-2009-4212, and CVE-2010-1321 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 4.1 ESXi ESXi410-201010401-SG
ESXi 4.0 ESXi not affected
ESX 4.1 ESX ESX410-201010419-SG
ESX 4.0 ESX not applicable
ESX 3.x ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
4. Solution
Please review the patch/release notes for your product and version
and verify the md5sum of your downloaded file.
ESXi 4.1
--------
ESXi410-201010401-SG
Download link: http://bit.ly/bb3xjV
md5sum: 05f1049c7a595481cd682e92fe8d3285
sha1sum: f6993c185f7d1cb971a4ae6e017e0246b8c25a76
http://kb.vmware.com/kb/1027753
ESX 4.1
-------
ESX410-201010001
Download link: http://bit.ly/a3Ffw8
md5sum: ff4435fd3c74764f064e047c6e5e7809
sha1sum: 322981f4dbb9e5913c8f38684369444ff7e265b3
http://kb.vmware.com/kb/1027027
ESX410-201010001 contains the following security bulletins:
ESX410-201010401-SG (COS kernel) | http://kb.vmware.com/kb/1027013
ESX410-201010419-SG (Likewise) | http://kb.vmware.com/kb/1027026
ESX410-201010404-SG (NSS) | http://kb.vmware.com/kb/1027016
ESX410-201010409-SG (tar) | http://kb.vmware.com/kb/1027019
ESX410-201010412-SG (Perl) | http://kb.vmware.com/kb/1027022
ESX410-201010413-SG (cpio) | http://kb.vmware.com/kb/1027023
ESX410-201010410-SG (cURL) | http://kb.vmware.com/kb/1027020
ESX410-201010401-SG (vmkernel64,
VMX, CIM)| http://kb.vmware.com/kb/1027013
ESX410-201010414-SG
(vmware-esx-pam-config)| http://kb.vmware.com/kb/1027024
ESX410-201010402-SG (GnuTLS, NSS,
and openSSL)| http://kb.vmware.com/kb/1027014
ESX410-201010001 also contains the following non-security bulletins
ESX410-201010405-BG ESX410-201010415-BG
To install an individual bulletin use esxupdate with the -b option.
5. References
CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
- - ------------------------------------------------------------------------
6. Change log
2010-11-15 VMSA-2010-0016
Initial security advisory after release of patches for ESX 4.1
on 2010-11-15
2011-01-04 VMSA-2010-0016.1
Updated security advisory in conjunction with the release of patches
for ESX 4.0 on 2011-01-04
- - -----------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center
http://www.vmware.com/security
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2010 VMware Inc. All rights reserved.
- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8
wj8DBQFNJBGxS2KysvBH1xkRAt2iAJ9WIZd1X3NMkOODf5OUrfH+Qz8xIQCfca83
f2ZtEscatmBKAuRrcuCz+aM=
=XfnL
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFNJQou/iFOrG6YcBERAp1oAJ0ZQV+dsxiyB9eyxeqT4NhD/FP8nQCgqIpi
WRZd0yNwPueWqmen08uUhGA=
=4E3v
-----END PGP SIGNATURE-----
|