copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
Security Bul...
»
AusCERT Exte...
» ESB-2011.0793.4 - UPDATE [VMware ESX] glibc and dhcp...
ESB-2011.0793.4 - UPDATE [VMware ESX] glibc and dhcp: Multiple vulnerabilities
Date:
12 March 2012
References
:
ESB-2010.0526
ESB-2011.0376
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2011.0793.4 VMware ESX third party updates for Service Console packages glibc and dhcp 12 March 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: glibc dhcp Publisher: VMware Operating System: VMWare ESX Server Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2011-1659 CVE-2011-1658 CVE-2011-1095 CVE-2011-1071 CVE-2011-0997 CVE-2011-0536 CVE-2010-0296 Reference: ESB-2011.0376 ESB-2010.0526 Revision History: March 12 2012: ESX 3.5 patches released October 13 2011: Updated security advisory after the release of ESX 4.0 patches on 2011-10-12. September 21 2011: Added CVE's July 29 2011: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2011-0010.3 Synopsis: VMware ESX third party updates for Service Console packages glibc and dhcp Issue date: 2011-07-28 Updated on: 2012-03-08 CVE numbers: CVE-2010-0296 CVE-2011-0536 CVE-2011-0997 CVE-2011-1071 CVE-2011-1095 CVE-2011-1658 CVE-2011-1659 ------------------------------------------------------------------------ 1. Summary ESX Service Console OS (COS) updates to remediate vulnerabilities in glibc and dhcp. 2. Relevant releases ESX 4.1 without patches ESX410-201107405-SG and ESX410-201107406-SG. ESX 4.0 without patches ESX400-201110406-SG and ESX400-201110408-SG. ESX 3.5 without patch ESX350-201203405-SG. 3. Problem Description a. Service Console update for DHCP The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-0997 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ========= ======== ======= ================= vCenter any Windows not affected hosted* any any not affected ESXi any any not affected ESX 4.1 ESX ESX410-201107405-SG ESX 4.0 ESX ESX400-201110406-SG ESX 3.5 ESX ESX350-201203405-SG ESX 3.0.3 ESX affected, no patch planned * hosted products are VMware Workstation, Player, ACE, Fusion. b. Service Console update for glibc This patch updates the glibc package for ESX service console to glibc-2.5-58.7602.vmw. This fixes multiple security issues in glibc, glibc-common and nscd including possible local privilege escalation. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2010-0296, CVE-2011-0536, CVE-2011-1095, CVE-2011-1071, CVE-2011-1658 and CVE-2011-1659 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ========= ======== ======= ================= vCenter any Windows not affected hosted* any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201107406-SG ESX 4.0 ESX ESX400-201110408-SG ESX 3.5 ESX not applicable ESX 3.0.3 ESX not applicable * hosted products are VMware Workstation, Player, ACE, Fusion. 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. ESX 4.1 ------- ESX410-201107001 https://hostupdate.vmware.com/software/VUM/OFFLINE/release-285-20110719-831 016/ESX410-201107001.zip md5sum: 5db911b51bd45fa4fbd710cf2111c20e sha1sum: 6b1ca691133b56b74f12cecac6409062c5d1efbf http://kb.vmware.com/kb/2000612 ESX410-201107001 contains ESX410-201107405-SG and ESX410-201107406-SG. ESX 4.0 ------- ESX400-201110001 https://hostupdate.vmware.com/software/VUM/OFFLINE/release-314-20111006-398 488/ESX400-201110001.zip md5sum: 0ce9cc285ea5c27142c9fdf273443d78 sha1sum: fdb5482b2bf1e9c97f2814255676e3de74512399 http://kb.vmware.com/kb/1036391 ESX400-201110001 contains ESX400-201110406-SG and ESX400-201110408-SG. ESX 3.5 ------- ESX350-201203405-SG http://downloads.vmware.com/go/selfsupport-download md5sum: 5103d34dbf40a350cfdce5f1f495ac98 sha1sum: df4e201dbc542d77b8b85a62551817aa0dee821a http://kb.vmware.com/kb/2009159 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0536 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659 ------------------------------------------------------------------------ 6. Change log 2011-07-28 VMSA-2011-0010 Initial security advisory in conjunction with the release of ESX 4.1 patches on 2011-07-28. 2011-09-19 VMSA-2011-0010.1 Updated security advisory with the CVE identifiers CVE-2011-1658 and CVE-2011-1659 that where erroneously left out from the initial version of the advisory. There is no change to the patch content. 2011-10-12 VMSA-2011-0010.2 Updated security advisory after the release of ESX 4.0 patches on 2011-10-12. 2011-03-08 VMSA-2011-0010.3 Updated security advisory after the release of ESX 3.5 patches on 2012-03-08. ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2011 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8 wj8DBQFPWZyiDEcm8Vbi9kMRAmWHAKCthrx6OnVGpiAH7kQIYyJYbbRRHwCgt1YT mv3KmagYxpBdCmzCXYdj9RY= =/zIl - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBT11x+e4yVqjM2NGpAQIEIQ//dCKu0IxYJLyoxQqrVVHN9F5X/mHaB3qj qPgnNzCbiCfbfKKpfzqQUNJZhcc92S0JsNcFbZvchhQlA+vsrhDhF4FrOwKJDQ1n Pk/o7mzndmwpbiNUQv9peFosCmZrvAQ6W8GIQDSS2rIg54zOGwIZyOQbWfsE4O9I 7iwHz7AqWNMrjLy8uhgJeZ+UJ+T7thMVn39n9l9QcXtG4uWIkvLxzgr5qpw4+1x+ TdFolJzolLMkavhIa/+0NB/8axI32nmeS4ZMVwGb/jzzQEB+PehiK2Pye+Phj5eU T1vAAgubyymK8JL/W+pio26o94ywHYoAJ5d3b+FKRGgG06I27EOq3bncl7tRAKtW xKAjG4pe7L9f7kdhZZmv8NU23pT6RREZo54PvCRnpjqCi1Y8/fSsg0z05YpcwQcv CCxNMlnQX/HspzkgW0ZXYxjDvQ7Pn4zXr7NhNaPIPmniV3HYLMzavP1DciRrZ/3D RS5xSJ+keGqwpp0ULyhf6wG+SVL+JKXHLzoQX4z5Wv/zvic1sJFRfz+qFk+BrUa7 AMCzOMB6bGHC2zM1Ap+y0IYq3Wi+bP9UB7IPD5fWCUDLge5WkIos/T9s9nkR57oD UBz3UiCMGnB94/d03+rxeAlIhksFXlnQZntWA4s/D8MvqkeOyJcEEkhyFJVnDDVQ fGT031n3AMs= =KveH -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=1980&it=14660