copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.2309.2 - UPDATE [Win][Linux][Virtual] VMware vSphere: Multiple vulnerabilities

Date: 28 January 2015
References: ASB-2013.0083  ESB-2014.0129  ESB-2014.0358  ESB-2014.0495  ESB-2014.0767  ESB-2015.0797  ESB-2015.1423  ESB-2015.1464  ESB-2015.1938  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2014.2309.2
      VMware vSphere product updates address security vulnerabilities
                              28 January 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          VMware vSphere
Publisher:        VMware
Operating System: Windows
                  Linux variants
                  VMware ESX Server
Impact/Access:    Denial of Service              -- Remote/Unauthenticated      
                  Cross-site Scripting           -- Remote with User Interaction
                  Provide Misleading Information -- Remote with User Interaction
                  Unauthorised Access            -- Remote/Unauthenticated      
                  Access Confidential Data       -- Remote with User Interaction
Resolution:       Patch/Upgrade
CVE Names:        CVE-2014-8371 CVE-2014-3797 CVE-2014-0191
                  CVE-2014-0138 CVE-2014-0015 CVE-2013-4238
                  CVE-2013-2877 CVE-2013-1752 

Reference:        ASB-2013.0083
                  ESB-2014.0767
                  ESB-2014.0495
                  ESB-2014.0358
                  ESB-2014.0129

Revision History: January  28 2015: Security advisory updated in conjunction with the release of VMware ESXi 5.5 Patches released on 2015-01-27
                  December  8 2014: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2014-0012.1
Synopsis:    VMware vSphere product updates address security 
             vulnerabilities
Issue date:  2014-12-04
Updated on:  2015-01-27
CVE number:  CVE-2014-3797, CVE-2014-8371, CVE-2013-2877, CVE-2014-0191, 
             CVE-2014-0015, CVE-2014-0138, CVE-2013-1752 and 
             CVE-2013-4238
- - ------------------------------------------------------------------------

1. Summary

   VMware vSphere product updates address a Cross Site Scripting issue, 
   a certificate validation issue and security vulnerabilities in 
   third-party libraries.
 
2. Relevant releases

   VMware vCenter Server Appliance 5.1 Prior to Update 3 

   VMware vCenter Server 5.5 prior to Update 2
   VMware vCenter Server 5.1 prior to Update 3
   VMware vCenter Server 5.0 prior to Update 3c

   VMware ESXi 5.1 without patch ESXi510-201412101-SG
   VMware ESXi 5.5
   VMware ESXi 5.0

3. Problem Description 

   a. VMware vCSA cross-site scripting vulnerability

      VMware vCenter Server Appliance (vCSA) contains a vulnerability
      that may allow for Cross Site Scripting. Exploitation of this 
      vulnerability in vCenter Server requires tricking a user to click
      on a malicious link or to open a malicious web page. 

      VMware would like to thank Tanya Secker of Trustwave SpiderLabs for 
      reporting this issue to us. 

      The Common Vulnerabilities and Exposures project (cve.mitre.org) 
      has assigned the name CVE-2014-3797 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      vCSA           5.5        any       Not Affected
      vCSA           5.1        any       5.1 Update 3
      vCSA           5.0        any       Not Affected

   b. vCenter Server certificate validation issue

      vCenter Server does not properly validate the presented certificate 
      when establishing a connection to a CIM Server residing on an ESXi 
      host. This may allow for a Man-in-the-middle attack against the CIM 
      service.

      VMware would like to thank The Google Security Team for reporting 
      this issue to us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2014-8371 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware          Product   Running   Replace with/
      Product         Version   on        Apply Patch
      =============   =======   =======   ==============
      vCenter Server  5.5       any       5.5 Update 2
      vCenter Server  5.1       any       5.1 Update 3
      vCenter Server  5.0       any       5.0 Update 3c

  c. Update to ESXi libxml2 package

     libxml2 is updated to address multiple security issues. 

     The Common Vulnerabilities and Exposures project 
     (cve.mitre.org) has assigned the names CVE-2013-2877 and
     CVE-2014-0191 to these issues. 

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is 
     available.

     VMware         Product    Running   Replace with/
     Product        Version    on        Apply Patch
     =============  =======    =======   =================
     ESXi           5.5        any       see VMSA-2015-0001
     ESXi           5.1        any       ESXi510-201412101-SG
     ESXi           5.0        any       see VMSA-2015-0001

  d. Update to ESXi Curl package

     Curl is updated to address multiple security issues. 

     The Common Vulnerabilities and Exposures project 
     (cve.mitre.org) has assigned the names CVE-2014-0015 and 
     CVE-2014-0138 to these issues. 

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is 
     available.

     VMware         Product  Running   Replace with/
     Product        Version  on        Apply Patch
     =============  =======  =======   =================
     ESXi           5.5      any       Patch Pending
     ESXi           5.1      any       ESXi510-201412101-SG
     ESXi           5.0      any       Patch Pending

  e. Update to ESXi Python package

     Python is updated to address multiple security issues. 

     The Common Vulnerabilities and Exposures project 
     (cve.mitre.org) has assigned the names CVE-2013-1752 and 
     CVE-2013-4238 to these issues. 

     Column 4 of the following table lists the action required to
     remediate the vulnerability in each release, if a solution is 
     available.

     VMware         Product  Running   Replace with/
     Product        Version  on        Apply Patch
     =============  =======  =======   =================
     ESXi           5.5      any       Patch Pending
     ESXi           5.1      any       ESXi510-201412101-SG
     ESXi           5.0      any       Patch Pending

  f. vCenter and Update Manager, Oracle JRE 1.6 Update 81

     Oracle has documented the CVE identifiers that are addressed in 
     JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update
     Advisory of July 2014. The References section provides a link to
     this advisory. 

     VMware                 Product  Running  Replace with/
     Product                Version  on       Apply Patch
     =============          =======  =======  =================
     vCenter Server         5.5      any      not applicable *
     vCenter Server         5.1      any      5.1 Update 3
     vCenter Server         5.0      any      patch pending
     vCenter Update Manager 5.5      any      not applicable *
     vCenter Update Manager 5.1      any      5.1 Update 3
     vCenter Update Manager 5.0      any      patch pending

     * this product uses the Oracle JRE 1.7.0 family

4. Solution

   Please review the patch/release notes for your product and version 
   and verify the checksum of your downloaded file. 
  
   vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and Update Manager 5.1
   Update 3
   ----------------------------
   Downloads and Documentation: 
   https://www.vmware.com/go/download-vsphere

   ESXi 5.1
   ----------------------------
   File: update-from-esxi5.1-5.1_update03.zip.zip
   md5sum: b3fd3549b59c6c59c04bfd09b08c6edf
   sha1sum: 02139101fe205894774caac02820f6ea8416fb8b
   http://kb.vmware.com/kb/2086288
   update-from-esxi5.1-5.1_update03 contains ESXi510-201412101-SG
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3797
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8371
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238

   JRE 
   Oracle Java SE Critical Patch Update Advisory of July 2014

  
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

- - ------------------------------------------------------------------------

6. Change log

   2014-12-04 VMSA-2014-0012
   Initial security advisory in conjunction with the release of VMware
   vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and ESXi 5.1 Patches 
   released on 2014-12-04.

   2015-01-27 VMSA-2014-0012.1
   Security advisory updated in conjunction with the release of
   VMware ESXi 5.5 Patches released on 2015-01-27.


- - ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2015 VMware Inc.  All rights reserved.


- -----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFUxqHHDEcm8Vbi9kMRAoSaAKD0BgI72YbonTMBbjAp1UMsFE2eBQCaAoPT
tg8/S+hjkMsW8AV18Kkj8Tw=
=UwKa
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVMhU0xLndAQH1ShLAQI/gA//TV8sLDb/Eyd3jyFyVWfhcpv2kvhEc1o5
/rZkeE9URwecR5ntiujBG81p0aqFuIX0Y7Cj7Hgb8rTtACztbNB7fMSjesTSLLWK
vPh56l90MMkBLzlVED4RzYlAy8XyO3TyWVo3zIHvBMIDNF2VWoEoJRq+d6K0JgLp
gihozkim/5ongPGT2XTxiOcCVUmRENi/JyQmOjnwKpEhgABgDkXQPAZOFem9ZrYD
bMyCbXmUbyPibh/xbjIck12kZ1lwFc8adDMjNIJZYR1JeoQtw4nXWaLHOotp5i2U
YDlF4mfwJ2o5TeFoJaNw/kk9mjGRjwr+hFiNR/BDc/96U+GBgI9tjlZvf+raE3MQ
3UY5qoo7MvpAbVVfiaB4ZarerB+uryGjpLIUeWrrsWF+3vXlwm8n4+IfTWcvOyr8
RWHKpQTRVO3l0sS8sRRW1bTgovbKkIBsuG9Ndx9uKkJTV59vsgy4qWqxEcqT3vkp
QQAqJQ0HywHuNwqYmmuXRskysAiZG3rPYsT8r9TcDNihux6B5caBJFLS89ToDddS
qdMHJS53ASjEjPNScgLEZq0ohZ+TRJir9lqyKyi+KiVQbrLjyxellogDPVqdisHR
6OwjEXoLia4sKsYSWYE7OwqBL9VvA6JbLM6kq2YsqP2s+IEMi9xeQjwF1M01xRNo
cKsavSpL6Kc=
=PjEV
-----END PGP SIGNATURE-----