Date: 06 January 2011
References: ESB-2010.0847 ESB-2010.1055.2 ESB-2011.0010.4 ESB-2011.0167.3
Related Files:
ESB-2010.1083
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2010.1083.2
VMware ESX third party update for Service Console
6 January 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ESX 4.1 Service Console OS
ESX 4.0 Service Console OS
Publisher: VMWare
Operating System: VMWare ESX Server
Impact/Access: Increased Privileges -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2010-3081
Reference: ESB-2010.1055
ESB-2010.0847
Revision History: January 6 2011: Patches for ESX 4.0
December 1 2010: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2010-0017.1
Synopsis: VMware ESX third party update for Service Console
kernel
Issue date: 2010-11-29
Updated on: 2011-01-04
CVE numbers: CVE-2010-3081
- - ------------------------------------------------------------------------
1. Summary
ESX Service Console OS (COS) kernel update.
2. Relevant releases
VMware ESX 4.1 without patch ESX410-201011402-SG
VMware ESX 4.0 without patch ESX400-201101401-SG
3. Problem Description
a. Service Console OS update for COS kernel package.
This patch updates the Service Console kernel to fix a stack
pointer underflow issue in the 32-bit compatibility layer.
Exploitation of this issue could allow a local user to gain
additional privileges.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-3081 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201011402-SG
ESX 4.0 ESX ESX400-201101401-SG **
ESX 3.x ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
** ESX 4.0 patch ESX400-201101401-SG also addresses the issues
identified by CVE-2010-0415, CVE-2010-0307, CVE-2010-0291,
CVE-2010-0622, CVE-2010-1087, CVE-2010-1437, and CVE-2010-1088.
These issues have been addressed for ESX 4.1 in an earlier ESX 4.1
patch release, see VMSA-2010-0016.1 for details.
4. Solution
Please review the patch/release notes for your product and version
and verify the md5sum of your downloaded file.
ESX 4.1
-------
ESX410-201011001
Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-253-20101122-763
417/ESX410-201011001.zip
md5sum: e73fd3302529c1d85d9cc47457dfb963
sha1sum: c0e0eac907c04105791ac44e288e7d8076dc14e0
http://kb.vmware.com/kb/1029400
ESX410-201011001 contains the following security bulletins:
ESX410-201011402-SG (COS kernel) | http://kb.vmware.com/kb/1029397
ESX410-201011001 also contains the following non-security bulletins
ESX410-201011401-BG
To install an individual bulletin use esxupdate with the -b option.
ESX 4.0
-------
ESX400-201101001
Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-257-20101231-664
659/ESX400-201101001.zip
md5sum: f1d522b380692e0845eb0dda480ab890
sha1sum: 906989af3ddacc41321d685c4afe0d740856f9d5
http://kb.vmware.com/kb/1029426
ESX400-201101001 contains the following security bulletins:
ESX400-201101401-SG (COS kernel) | http://kb.vmware.com/kb/1029424
ESX400-201101405-SG (glibc) | http://kb.vmware.com/kb/1029881
ESX400-201101404-SG (sudo) | http://kb.vmware.com/kb/1029421
ESX400-201101402-SG (openldap) | http://kb.vmware.com/kb/1029423
ESX400-201101405-SG, ESX400-201101404-SG and ESX400-201101402-SG
are documented in VMSA-2011-0001.
To install an individual bulletin use esxupdate with the -b option.
5. References
CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081
- - ------------------------------------------------------------------------
6. Change log
2010-11-29 VMSA-2010-0017
Initial security advisory after release of patches for ESX 4.1
on 2010-11-29
2011-01-04 VMSA-2010-0017.1
Updated security advisory in conjunction with the release of patches
for ESX 4.0 on 2011-01-04
- - -----------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center
http://www.vmware.com/security
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2010 VMware Inc. All rights reserved.
- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8
wj8DBQFNJBJQS2KysvBH1xkRAj5eAJ9qF7sRzooi13kV9oGstDAZaWV3YwCeNIhm
UXENer7FAURMTG3nDWz9vno=
=fB+Q
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFNJQq+/iFOrG6YcBERAgYKAJ0cQunt3cwYGBZdKpN1n0gaRgmAfgCdFigR
yE/ehUmPs22MyyAktPXd0V8=
=PPLR
-----END PGP SIGNATURE-----
|