ESB-2018.2676 - [Apple iOS] VMware AirWatch Agent and VMware Content Locker : Access privileged data - Existing account 2018-09-07

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2676
          VMware AirWatch Agent and VMware Content Locker updates
                 resolve data protection vulnerabilities.
                             7 September 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware AirWatch Agent and VMware Content Locker
Publisher:         VMWare
Operating System:  Apple iOS
Impact/Access:     Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6976 CVE-2018-6975 

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2018-0023.html

- --------------------------BEGIN INCLUDED TEXT--------------------

                        VMware Security Advisory

Advisory ID: VMSA-2018-0023
Severity:    Low
Synopsis:    AirWatch Agent and VMware Content Locker updates resolve
             data protection vulnerabilities.
Issue date:  2018-09-05
Updated on:  2018-09-05 (Initial Advisory)
CVE number:  CVE-2018-6975
             CVE-2018-6976

1. Summary

   AirWatch Agent and VMware Content Locker updates resolve data
   protection vulnerabilities.

2. Relevant Products

   AirWatch Agent for iOS (A/W Agent)
   VMware Content Locker for iOS (A/W Locker)

3. Problem Description

   a. The AirWatch Agent for iOS devices contains a data
   protection vulnerability

   The AirWatch Agent for iOS devices contains a data protection
   vulnerability whereby the files and keychain entries in the Agent are
   not encrypted.

   VMware would like to thank Stephan Sekula of Compass Security for
   reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6975 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product   Running           Replace with/     Mitigation/
   Product     Version   on      Severity  Apply Patch       Workaround

   A/W Agent   x.x       iOS     Low       5.8.1             None

   b. The VMware Content Locker for iOS devices contains a data
   protection vulnerability

   The VMware Content Locker for iOS devices contains a data protection
   vulnerability in the SQLite database. This vulnerability relates to
   unencrypted filenames and associated metadata in SQLite database for
   the Content Locker.

   VMware would like to thank Stephan Sekula of Compass Security for
   reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6976 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product   Running           Replace with/     Mitigation/
   Product     Version   on     Severity   Apply Patch       Workaround

   A/W Locker  x.x       iOS    Low        4.14              None

4. Solution

  AirWatch Agent for iOS 5.8.1
  Downloads and Documentation:
  https://itunes.apple.com/us/app/airwatch-agent/id338761996?mt=3D8

  VMware Content Locker for iOS 4.14
  Downloads and Documentation:
  https://itunes.apple.com/us/app/vmware-content-locker/id525890839?mt=3D8

5. References

   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6975
   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6976

- - ------------------------------------------------------------------------

6. Change log

   2018-09-05: Initial security advisory in conjunction with the release
   of VMware Content Locker for iOS 4.14 on 2018-09-05

- - ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce@lists.vmware.com<mailto:security-announce@lists.vmwar=
e.com>
    bugtraq@securityfocus.com<mailto:bugtraq@securityfocus.com>
    fulldisclosure@seclists.org<mailto:fulldisclosure@seclists.org>

   E-mail: security at vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
   https://blogs.vmware.com/security

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc. All rights reserved.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=1r9R
-----END PGP SIGNATURE-----

« Back to bulletins