Jump to content


Photo

VMware svr and client multiple vulns - updates available


  • Please log in to reply
168 replies to this topic

#151 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 10 November 2016 - 09:20 AM

FYI...

VMSA-2016-0018 - VMware product updates address local privilege escalation vuln in linux kernel
- https://www.vmware.c...-2016-0018.html
2016-11-09
Severity: Important
CVE numbers: CVE-2016-5195
1. Summary: VMware product updates address local privilege escalation vulnerability in linux kernel
2. Relevant Products
    VMware Identity Manager
    vRealize Automation
    vRealize Operations
3. Problem Description: Local privilege escalation vulnerability in linux kernel
The Linux kernel which ships with the base operating system of VMware Appliances contains a race condition in the way its memory subsystem handles copy-on-write (aka “Dirty COW”). Successful exploitation of the vulnerability may allow for local privilege escalation. The product lines listed in this advisory have been confirmed to be affected.
VMware products that are not affected are documented in VMware Knowledge Base article 2147515:
- https://kb.vmware.co...ernalId=2147515
Resolution: vSphere ESXi Hypervisor
ESXi is not affected by CVE-2016-5195.
Windows based products:
Windows based products, including all versions of vCenter Server running on Windows, are not affected by CVE-2016-5195.
VMware products that run on Linux:
VMware products that run on Linux (excluding virtual appliances) might use a vulnerable kernel as part of the base operating system. VMware recommends that customers contact their operating system vendor for resolution.
VMware Workstation for Linux is an example of this type of product.
VMware Virtual Appliances:
vSECR has determined that some virtual appliances are affected by CVE-2106-5195, but the severity of the issue varies widely from product to product. Affected products and remediation paths are announced in VMSA-2016-0018..."
4. Solution:
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vRealize Operations:
Downloads and Documentation:
- https://kb.vmware.com/kb/2147630
- https://kb.vmware.com/kb/2147668
- https://kb.vmware.com/kb/2147667
- https://kb.vmware.com/kb/2147666
- https://kb.vmware.com/kb/2147664
 

:ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#152 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 14 November 2016 - 07:57 AM

FYI...

VMSA-2016-0019 - VMware Workstation and Fusion updates address critical out-of-bounds memory access vuln
- https://www.vmware.c...-2016-0019.html
2016-11-13
Severity: Critical
CVE numbers: CVE-2016-7461
1. Summary: VMware Workstation and Fusion updates address address critical out-of-bounds memory access vulnerability.
2. Relevant Products:
    VMware Workstation Pro / Player
    VMware Fusion Pro / Fusion
3. Problem Description:
a. VMware Workstation and Fusion out-of-bounds memory access vulnerability
The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.
Workaround: On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player...
4. Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation Pro 12.5.2 / Downloads and Documentation
- https://www.vmware.c...loadworkstation
- https://www.vmware.c...bs/ws_pubs.html
VMware Workstation Player 12.5.2 / Downloads and Documentation
- https://www.vmware.c.../downloadplayer
- https://www.vmware.c...layer_pubs.html
VMware Fusion Pro / Fusion 8.5.2 / Downloads and Documentation
- https://www.vmware.c.../downloadfusion
- https://www.vmware.c...usion_pubs.html...

- http://www.securityt....com/id/1037282
CVE Reference: CVE-2016-7461
Nov 14 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation 12.x; Fusion 8.x ...
Impact: A local user on the guest system can gain privileges on the host system.
Solution: The vendor has issued a fix (Workstation 12.5.2; Fusion 8.5.2)...
___

- https://www.us-cert....ecurity-Updates
Nov 14, 2016
 

:ph34r: :ph34r: :ph34r:


Edited by AplusWebMaster, 15 November 2016 - 08:52 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#153 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 16 November 2016 - 07:03 AM

FYI...

VMSA-2016-0020 - vRealize Operations update addresses REST API deserialization vuln
- https://www.vmware.c...-2016-0020.html
2016-11-15
CVE numbers: CVE-2016-7462
1. Summary: vRealize Operations update addresses REST API deserialization vulnerability.
2. Relevant Products
    vRealize Operations
3. Problem Description
a. vRealize Operations REST API deserialization vulnerability
vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content   and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be  chosen. Overwriting files is not feasible...
4. Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vRealize Operations: Downloads and Documentation:
- https://my.vmware.co..._operations/6_4
___

- http://www.securityt....com/id/1037297
CVE Reference: CVE-2016-7462
Nov 16 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Operations 6.x ...
Impact: A remote user can move existing files into certain folders and write files with arbitrary content to cause denial of service conditions.
Solution: The vendor has issued a fix (Operations 6.4.0)...
___

- https://www.us-cert....Security-Update
Nov 17, 2016
 

:ph34r:


Edited by AplusWebMaster, 17 November 2016 - 01:35 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#154 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 23 November 2016 - 08:35 AM

FYI...

VMSA-2016-0021 - VMware product updates address partial information disclosure vuln
- https://www.vmware.c...-2016-0021.html
2016-11-22
CVE numbers: CVE-2016-5334
1. Summary: VMware product updates address partial information disclosure vulnerability
2. Relevant Products:
    VMware Identity Manager
    vRealize Automation
3. Problem Description: Partial information disclosure vulnerability in VMware Identity Manager
VMware Identity Manager contains a vulnerability that may allow for a partial information disclosure. Successful exploitation of the vulnerability may allow read access to files contained in the /SAAS/WEB-INF and /SAAS/META-INF directories remotely...
4. Solution: Please review the patch/release notes for your product and version and   verify the checksum of your downloaded file.
VMware Identity Manager / Downloads and Documentation:
- https://my.vmware.co...ity_manager/2_7
vRealize Automation / Downloads and Documentation:
- https://my.vmware.co..._automation/7_2

- http://www.securityt....com/id/1037326
CVE Reference: CVE-2016-5334
Nov 22 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.x ...
Impact: A remote user can view files in the '/SAAS/WEB-INF' and '/SAAS/META-INF' directories on the target system.
Solution: The vendor has issued a fix (vRealize Automation 7.2.0)...
___

VMSA-2016-0022 - VMware product updates address information disclosure vuln
- https://www.vmware.c...-2016-0022.html
2016-11-22
CVE numbers: CVE-2016-7458, CVE-2016-7459, CVE-2016-7460
1. Summary: VMware vCenter Server, vSphere Client, and vRealize Automation updates address information disclosure vulnerabilities.
2. Relevant Products:
    VMware vCenter Server
    VMware vSphere Client
    vRealize Automation
3. Problem Description:
a. vSphere Client XML External Entity vulnerability:
The vSphere Client contains an XML External Entity (XXE) vulnerability. This issue can lead to information disclosure if a vSphere Client user is tricked into connecting to a malicious instance of vCenter Server or ESXi.
There are no known workarounds for this issue...
4. Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vCenter Server / Downloads and Documentation:
- https://www.vmware.c...ownload-vsphere
vRealize Automation / Downloads and Documentation:
- https://my.vmware.co..._automation/6_2
VMware Knowledge Base article 2089791:
- https://kb.vmware.co...ernalId=2089791

- http://www.securityt....com/id/1037327
CVE Reference: CVE-2016-7460
Nov 23 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.x ...
Impact: A remote user can obtain potentially sensitive information from the target system.
A remote user can cause denial of service conditions.
Solution: The vendor has issued a fix (vRealize Automation VA 6.2.5)...

- http://www.securityt....com/id/1037328
CVE Reference: CVE-2016-7458
Nov 23 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Client 5.5, 6.0 ...
Impact: A remote user can obtain potentially sensitive information on the target system.
Solution: The vendor has issued a fix (5.5 U3e, 6.0 U2a)...

- http://www.securityt....com/id/1037329
CVE Reference: CVE-2016-7459, CVE-2016-7460
Nov 23 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Server 5.5, 6.0 ...
Impact: A remote user can potentially sensitive information from the target system.
A remote user can cause denial of service conditions.
Solution: The vendor has issued a fix (5.5 U3e, 6.0 U2a)...
 

:ph34r: :ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#155 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 20 December 2016 - 12:33 PM

FYI...

VMSA-2016-0023 - VMware ESXi updates address a cross-site scripting issue
- https://www.vmware.c...-2016-0023.html
Dec 20, 2016
Severity: Important
Synopsis: VMware ESXi updates address a cross-site scripting issue
Relevant Products: VMware vSphere Hypervisor (ESXi)
Problem Description:
a. Host Client stored cross-site scripting issue
The ESXi Host Client contains a vulnerability that may allow for stored cross-site scripting (XSS). The issue can be introduced by an attacker that has permission to manage virtual machines through ESXi Host Client or by tricking the vSphere administrator to import a specially crafted VM. The issue may be triggered on the system from where ESXi Host Client is used to manage the specially crafted VM.
VMware advises not to import VMs from untrusted sources...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
ESXi 6.0
Downloads:
- https://www.vmware.c...indPatch.portal
Documentation:   
- http://kb.vmware.com/kb/2145815
ESXi 5.5   
Downloads:
- https://www.vmware.c...indPatch.portal
Documentation:   
- http://kb.vmware.com/kb/2148194
Change log: 2016-12-20 VMSA-2016-0023
Initial security advisory in conjunction with the release of VMware ESXi 5.5 patches on 2016-12-20...
___

- http://www.securityt....com/id/1037501
CVE Reference: CVE-2016-7463
Dec 20 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.5, 6.0
Impact: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the VMware interface, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution: The vendor has issued a fix (ESXi550-201612102-SG, ESXi600-201611102-SG)...
___

- https://www.us-cert....Security-Update
Dec 20, 2016
 

:ph34r:


Edited by AplusWebMaster, 21 December 2016 - 08:36 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#156 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 21 December 2016 - 06:21 AM

FYI...

VMSA-2016-0024 - vSphere Data Protection (VDP) updates address SSH Key-Based authentication issue
- https://www.vmware.c...-2016-0024.html
Dec 20, 2016
Severity: Critical
Synopsis: vSphere Data Protection (VDP) updates address SSH Key-Based authentication issue
Relevant Products: vSphere Data Protection (VDP)
Problem Description: VDP SSH key-based authentication issue
VDP contains a private SSH key with a known password that is configured to allow key-based authentication. Exploitation of this issue may allow an unauthorized remote attacker to log into the appliance with root privileges...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vSphere Data Protection
Downloads and Documentation:
- http://kb.vmware.com/kb/2147069
___

- http://www.securityt....com/id/1037502
CVE Reference: CVE-2016-7456
Dec 20 2016
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Data Protection 5.5.x, 5.8.x, 6.0.x, 6.1.x
Impact: A remote user can gain root access to the target system.
Solution: The vendor has issued a fix (vSphere Data Protection patch KB2147069)...
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 21 December 2016 - 08:39 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#157 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 31 January 2017 - 05:24 AM

FYI...

VMSA-2017-0001 - AirWatch updates address bypass of root detection and local data encryption
- https://www.vmware.c...-2017-0001.html
2017-01-30
Severity: Important
Summary: AirWatch updates address bypass of root detection and local data encryption
Relevant Products:
    Airwatch Agent
    Airwatch Console
    AirWatch Inbox
Problem Description:
a. Root detection bypass
Airwatch Agent for Android contains a vulnerability that may allow a device to bypass root detection during enrollment. Successful exploitation of this issue may result in an enrolled device having unrestricted access over local Airwatch security controls and data...
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4895 to this issue...
b. Local data encryption bypass
Airwatch Inbox for Android contains a vulnerability that may allow a rooted device to decrypt the local data used by the application. Successful exploitation of this issue may result in an unauthorized disclosure of confidential data...
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4896 to this issue...
Solution:
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
Airwatch Agent for Android
Downloads and Documentation:
- https://play.google....roidagent&hl=en
Airwatch Agent for Android
Downloads and Documentation:
- https://play.google....tch.email&hl=en
References
- http://cve.mitre.org...e=CVE-2017-4895
- http://cve.mitre.org...e=CVE-2017-4896
- https://support.air-...es/115002293928
- https://support.air-...es/115002156907
___

- http://www.securityt....com/id/1037738
CVE Reference: CVE-2017-4895, CVE-2017-4896
Jan 30 2017
Fix Available:  Yes  Vendor Confirmed:  Yes ...
Impact: A local user can obtain potentially sensitive information on the target system.
A local user can obtain elevated privileges on the target system.
Solution: The vendor has issued a fix (Agent 7.0; Console 9.0 FP1 [plus use Pin-Based Encryption]; Inbox 2.12 [plus use Pin-Based Encryption])...
 

:ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#158 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 04 March 2017 - 06:34 AM

FYI...

VMSA-2017-0002 - Horizon DaaS update addresses an insecure data validation issue
- https://www.vmware.c...-2017-0002.html
2017-03-02
Summary: Horizon DaaS update addresses an insecure data validation issue
Relevant Products: VMware Horizon DaaS
Problem Description: Horizon DaaS insecure data validation
Horizon DaaS contains a vulnerability that exists due to insufficient validation of data. An attacker may exploit this issue by tricking DaaS client users into connecting to a malicious server and sharing all their drives and devices. Successful exploitation of this vulnerability requires a victim to download a specially crafted RDP file through DaaS client by clicking on a malicious link...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Horizon DaaS   
Downloads:
- https://my.vmware.co...orizon_daas/7_0
Documentation:   
- https://www.vmware.c...tform-pubs.html
References:
- http://cve.mitre.org...e=CVE-2017-4897

- http://www.securityt....com/id/1037951
CVE Reference: CVE-2017-4897
Mar 3 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Daas 6.1.x ...
Impact: A remote user can gain access to devices and drives on the target user's system.
Solution: The vendor has issued a fix (DaaS 7.0.0)...
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#159 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 10 March 2017 - 05:48 AM

FYI...

VMSA-2017-0003 - VMware Workstation update addresses multiple security issues
- https://www.vmware.c...-2017-0003.html
2017-03-09
Severity: Important
Summary: VMware Workstation update addresses multiple security issues
Relevant Products: VMware Workstation Pro/Player
Problem Description:
a. VMware Workstation DLL loading vulnerability   
VMware Workstation Pro/Player contains a DLL loading vulnerability that occurs due to the "vmware-vmx" process loading DLLs from a path defined in the local environment-variable. Successful exploitation of this issue may allow normal users to escalate privileges to System in the host machine where VMware Workstation is installed...
b. VMware Workstation SVGA driver vulnerability    
VMware Workstation Pro/Player contains a security vulnerability that exists in the SVGA driver. An attacker may exploit this issue to crash the VM or trigger an out-of-bound read.       
Note: This issue can be triggered only when the host has no graphics card or no graphics drivers are installed...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation Pro 12.5.3  
Downloads and Documentation:
- https://www.vmware.c...loadworkstation
- https://www.vmware.com/support/pubs/ws_pubs.html  
VMware Workstation Player 12.5.3    
Downloads and Documentation:  
- https://www.vmware.c.../downloadplayer
- https://www.vmware.c...layer_pubs.html

- http://www.securityt....com/id/1037979
CVE Reference: CVE-2017-4898, CVE-2017-4899, CVE-2017-4900
Mar 10 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation Pro and Workstation Player 12.x prior to 12.5.3 ...
Impact: A local user on the guest system can cause denial of service conditions on the guest system.
A local user on the guest system can gain elevated privileges on the host system.
Solution: The vendor has issued a fix (Workstation 12.5.3)...
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#160 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 14 March 2017 - 09:12 AM

FYI...

VMSA-2017-0004 - VMware product updates resolve remote code execution vulnerability via Apache Struts 2
- https://www.vmware.c...-2017-0004.html
2017-03-13
Summary: VMware product updates resolve remote code execution vulnerability via Apache Struts 2
Relevant Products:
    Horizon Desktop as-a-Service Platform (DaaS)
    VMware vCenter Server (vCenter)
    vRealize Operations Manager (vROps)
    vRealize Hyperic Server (Hyperic)
Problem Description: Remote code execution vulnerability via Apache Struts 2
Multiple VMware products contain a remote code execution vulnerability due to the use of Apache Struts 2. Successful exploitation of this issue may result in the complete compromise of an affected product...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Server
Downloads and Documentation:
- https://kb.vmware.com/kb/2149434
References:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638  
- https://struts.apach...ocs/s2-045.html
- https://kb.vmware.com/kb/2149434
___

VMSA-2017-0005 - VMware Workstation and Fusion updates address out-of-bounds memory access vulnerability
- https://www.vmware.c...-2017-0005.html
2017-03-14
Summary: VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability.
Relevant Products:
    VMware Workstation Pro / Player
    VMware Fusion Pro / Fusion
Problem Description:
a. VMware Workstation and Fusion out-of-bounds memory access vulnerability
The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.
Workaround: On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation Pro 12.5.4
Downloads and Documentation
- https://www.vmware.c...loadworkstation
- https://www.vmware.c...bs/ws_pubs.html
VMware Workstation Player 12.5.4
Downloads and Documentation
- https://www.vmware.c.../downloadplayer
- https://www.vmware.c...layer_pubs.html
VMware Fusion Pro / Fusion 8.5.5
Downloads and Documentation
- https://www.vmware.c.../downloadfusion
- https://www.vmware.c...usion_pubs.html
References:
- http://cve.mitre.org...e=CVE-2017-4901
Workaround documentation / Workstation Pro
Disabling drag-and-drop and copy-and-paste functionality, page 81 and 82
- http://pubs.vmware.c...-user-guide.pdf
Fusion / Disabling drag-and-drop and copy-and-paste functionality, page 135
- http://pubs.vmware.c...-user-guide.pdf

- http://www.securityt....com/id/1038025
CVE Reference: CVE-2017-4901
Mar 15 2017
Fix Available:  Yes  Vendor Confirmed:  Yes ...
Impact: A local user on the guest system can gain elevated privileges on the host system.
Solution: The vendor has issued a fix (Workstation 12.5.4; Fusion 8.5.5)...
___

- https://www.us-cert....ecurity-Updates
Mar 14, 2017
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 15 March 2017 - 04:54 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#161 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 28 March 2017 - 04:02 PM

FYI...

VMSA-2017-0006 - VMware ESXi, Workstation and Fusion updates address critical and moderate security issues
- https://www.vmware.c...-2017-0006.html
2017-03-28
CVE numbers: CVE-2017-4902, CVE-2017-4903, CVE-2017-4904, CVE-2017-4905
Summary: VMware ESXi, Workstation and Fusion updates address critical and moderate security issues.
- Relevant Products
    VMware ESXi (ESXi)  
    VMware Workstation Pro / Player (Workstation)  
    VMware Fusion Pro, Fusion (Fusion)
- Problem Description: ESXi, Workstation, Fusion SVGA memory corruption
a. ESXi, Workstation, Fusion have a heap buffer overflow and uninitialized stack memory usage in SVGA. These issues may allow a guest to execute code on the host...
Note: ESXi 6.0 is affected by CVE-2017-4903 but not by CVE-2017-4902...
* Additional ESXi 6.0 patches are provided for customers that are on ESXi 6.0 U1 or ESXi 6.0 U2...
b. ESXi, Workstation, Fusion XHCI uninitialized memory usage
The ESXi, Workstation, and Fusion XHCI controller has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5.
* Additional ESXi 6.0 patches are provided for customers that are on ESXi 6.0 U1 or ESXi 6.0 U2...
c. ESXi, Workstation, and Fusion uninitialized memory usage
ESXi, Workstation, and Fusion have uninitialized memory usage. This issue may lead to an information leak...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
> VMware ESXi 6.5 - Downloads:  
- https://my.vmware.co...up/vmware/patch
Documentation:  
- http://kb.vmware.com/kb/2149573
> VMware ESXi 6.0 patch on top of ESXi 6.0 U3
Downloads:
- https://my.vmware.co...up/vmware/patch
Documentation:   
- http://kb.vmware.com/kb/2149569
> VMware ESXi 6.0 patch on top of ESXi 6.0 U2  
Downloads:  
- https://my.vmware.co...dGroup=ESXI60U2 
(Click on the above link and scroll down to ESXi600-201703003 Offline Bundle)
Documentation:  
- http://kb.vmware.com/kb/2149673 
> VMware ESXi 6.0 patch on top of ESXi 6.0 U1  
Downloads:  
- https://my.vmware.co...Group=ESXI60U1B
(Click on the above link and scroll down to ESXi600-201703002 Offline Bundle)
Documentation:  
- http://kb.vmware.com/kb/2149672
> ESXi 5.5   
Downloads:
- https://my.vmware.co...up/vmware/patch
Documentation:   
- http://kb.vmware.com/kb/2149577
> VMware Workstation Pro 12.5.5
Downloads and Documentation:  
- https://www.vmware.c...loadworkstation 
- https://www.vmware.c...bs/ws_pubs.html 
> VMware Workstation Player 12.5.5  
Downloads and Documentation:  
- https://www.vmware.c.../downloadplayer 
- https://www.vmware.c...layer_pubs.html
> VMware Fusion Pro / Fusion 8.5.6  
Downloads and Documentation:  
- https://www.vmware.c.../downloadfusion 
- https://www.vmware.c...usion_pubs.html

VMware Knowledge Base article 2149673  
- http://kb.vmware.com/kb/2149673
VMware Knowledge Base article 2149672  
- http://kb.vmware.com/kb/2149672

Change log: 2017-03-28 VMSA-2017-0006  
 Initial security advisory in conjunction with the release of ESXi patches and VMware Workstation Pro/Player 12.5.5 and VMware Fusion Pro, Fusion 8.5.6 on 2017-03-28...
___

- http://www.securityt....com/id/1038148
CVE Reference: CVE-2017-4902, CVE-2017-4903, CVE-2017-4904, CVE-2017-4905
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Fusion 8.x, Workstation 12.x ...
Impact: A local user on the guest system can gain elevated privileges on the host system.
A local user on the guest system can obtain potentially sensitive information on the host system.
Solution: The vendor has issued a fix (Fusion 8.5.6, Workstation 12.5.5).
The vendor advisory is available at: http://www.vmware.co...-2017-0006.html

- http://www.securityt....com/id/1038149
CVE Reference: CVE-2017-4902, CVE-2017-4903, CVE-2017-4904, CVE-2017-4905
Mar 28 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.5, 6.0, 6.5 ...
Impact: A local user on the guest system can gain elevated privileges on the host system.
A local user on the guest system can obtain potentially sensitive information on the host system.
Solution: The vendor has issued a fix.
The vendor advisory is available at: http://www.vmware.co...-2017-0006.html
___

- https://www.us-cert....ecurity-Updates
March 28, 2017
 

:ph34r: :ph34r: :ph34r:


Edited by AplusWebMaster, 29 March 2017 - 02:15 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#162 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 14 April 2017 - 09:56 AM

FYI...

VMSA-2017-0007 - VMware vCenter Server updates resolve a remote code execution vuln
- https://www.vmware.c...-2017-0007.html
2017-04-13
Advisory ID: VMSA-2017-0007
Severity: Critical
Synopsis: VMware vCenter Server updates resolve a remote code execution vulnerability via BlazeDS
CVE-2017-5641
Summary: VMware vCenter Server updates resolve a remote code execution vulnerability via BlazeDS
Relevant Products: VMware vCenter Server
Problem Description: Remote code execution vulnerability via BlazeDS
VMware vCenter Server contains a remote code execution vulnerability due to the use of BlazeDS to process AMF3 messages. This issue may be exploited to execute arbitrary code when deserializing an untrusted Java object...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
> VMware vCenter Server 6.5c  
Downloads: https://my.vmware.co...=618&rPId=15826 
Documentation: : https://www.vmware.com/support/pubs/vsphere-esxi-vcenter-server-6-pubs.html  
> VMware vCenter Server 6.0U3b  
Downloads: https://my.vmware.co...=491&rPId=15722 
Documentation: https://www.vmware.c...ver-6-pubs.html
References:
- http://cve.mitre.org...e=CVE-2017-5641
- https://kb.vmware.com/kb/2149815 
- https://kb.vmware.com/kb/2149816..."
___

- http://www.securityt....com/id/1038273
CVE Reference: CVE-2017-5641
Apr 15 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0, 6.5 ...
Impact: A remote user can execute arbitrary code on the target system.
Solution: The vendor has issued a fix (6.0U3b, 6.5c)...
___

- https://www.us-cert....ecurity-Updates
April 14, 2017
 

:ninja: :ninja:


Edited by AplusWebMaster, 16 April 2017 - 05:01 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#163 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 18 April 2017 - 04:45 PM

FYI...

VMSA-2017-0008 - VMware Unified Access Gateway, Horizon View and Workstation updates
- https://www.vmware.c...-2017-0008.html
2017-04-18
Severity: Critical
Synopsis: VMware Unified Access Gateway, Horizon View and Workstation updates resolve multiple security vulnerabilities
CVE numbers: CVE-2017-4907, CVE-2017-4908, CVE-2017-4909, CVE-2017-4910, CVE-2017-4911, CVE-2017-4912, CVE-2017-4913
Summary: VMware Unified Access Gateway, Horizon View and Workstation updates resolve multiple security vulnerabilities
Relevant Products:
    VMware Unified Access Gateway (formerly called Access Point)  
    VMware Horizon View     
    VMware Horizon View Client for Windows
    VMware Workstation Pro / Player (Workstation)
Problem Description:
a. Unified Access Gateway and Horizon View heap buffer-overflow vulnerability
VMware Unified Access Gateway and Horizon View contain a heap buffer-overflow vulnerability which may allow a remote attacker to execute code on the security gateway... The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4907 to this issue...
b. Multiple heap-based buffer overflow issues via Cortado ThinPrint
VMware Workstation and Horizon View Client contain multiple heap buffer-overflow vulnerabilities in JPEG2000 and TrueType Font (TTF) parsers in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View... The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-4908 (JPEG2000) and CVE-2017-4909 (TTF) to these issues...
c. Multiple out-of-bounds read/write issues via Cortado ThinPrint
VMware Workstation and Horizon View Client contain multiple out-of-bounds read/write vulnerabilities in JPEG2000 and TrueType Font (TTF) parsers in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View... The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-4910 (JPEG2000), CVE-2017-4911 (JPEG2000) and CVE-2017-4912 (TTF) to these issues...
d. Integer overflow vulnerability via Cortado ThinPrint
VMware Workstation and Horizon Client contain an integer-overflow vulnerability in the True Type Font parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View... The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4913 to this issue...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Unified Access Gateway 2.9: Downloads and Documentation:
- https://my.vmware.com/web/vmware/details?downloadGroup=VIEW-APPS-710-ADV&productId=643&rPId=15408   
- https://pubs.vmware....nt-29/index.jsp
VMware Unified Access Gateway 2.8.1: Downloads and Documentation:  
- https://my.vmware.co...=577&rPId=13519
- http://pubs.vmware.c...nt-28/index.jsp
VMware Horizon View 7.1.0: Downloads and Documentation:  
- https://my.vmware.co...are_horizon/7_1
- https://www.vmware.c.../view_pubs.html
VMware Horizon View 6.2.4: Downloads and Documentation:  
- https://my.vmware.co...are_horizon/6_2
- https://www.vmware.c.../view_pubs.html
VMware Workstation Pro 12.5.3: Downloads and Documentation:  
- https://www.vmware.c...loadworkstation 
- https://www.vmware.c...bs/ws_pubs.html 
VMware Workstation Player 12.5.3: Downloads and Documentation:  
- https://www.vmware.c.../downloadplayer 
- https://www.vmware.c...layer_pubs.html
___

VMSA-2017-0008.1
- https://www.vmware.c...-2017-0008.html
Change log: 2017-04-19 VMSA-2017-0008.1
Corrected the VMware Horizon View Client for Windows version.

VMSA-2017-0008.2
- https://www.vmware.c...-2017-0008.html
Change log: 2017-04-21 VMSA-2017-0008.2
Updated security advisory to clarify the Unified Access Gateway and Horizon View affected versions.
___

- http://www.securityt....com/id/1038280
CVE Reference: CVE-2017-4908, CVE-2017-4909, CVE-2017-4910, CVE-2017-4911, CVE-2017-4912
Apr 18 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation 12.x ...
Impact: A local user on the guest system can cause denial of service conditions on the host system.
A local user on the guest system can gain elevated privileges on the host system.
Solution: The vendor has issued a fix (12.5.3)...

- http://www.securityt....com/id/1038281
CVE Reference: CVE-2017-4907, CVE-2017-4908, CVE-2017-4909, CVE-2017-4910, CVE-2017-4911, CVE-2017-4912, CVE-2017-4913
Apr 18 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.2.x, 7.x ...
Impact: A remote user can execute arbitrary code on the target system.
A local user on the guest system can cause denial of service conditions on the host system.
A local user on the guest system can gain elevated privileges on the host system.
Solution: The vendor has issued a fix (6.2.4, 7.1.0)...
___

- https://www.us-cert....ecurity-Updates
April 18, 2017
 

:ninja: :ninja: :ninja:


Edited by AplusWebMaster, 21 April 2017 - 11:08 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#164 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 19 May 2017 - 09:17 AM

FYI...

VMSA-2017-0009 - VMware Workstation update addresses multiple security issues
- https://www.vmware.c...-2017-0009.html
2017-05-18
Severity: Important
Relevant Products: VMware Workstation Pro/Player
Problem Description
a. VMware Workstation Insecure library loading vulnerability  
VMware Workstation Pro/Player contains an insecure library loading vulnerability via ALSA sound driver configuration files. Successful exploitation of this issue may allow unprivileged host users to escalate their privileges to root in a Linux host machine...
b. VMware Workstation NULL pointer dereference vulnerability  
VMware Workstation Pro/Player contains a NULL pointer dereference vulnerability that exists in the vstor2 driver. Successful exploitation of this issue may allow host users with normal user privileges to trigger a denial-of-service in a Windows host machine...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation Pro 12.5.6:  
Downloads and Documentation:
- https://www.vmware.c...loadworkstation
- https://www.vmware.com/support/pubs/ws_pubs.html  
VMware Workstation Player 12.5.6:
Downloads and Documentation:  
- https://www.vmware.c.../downloadplayer
- https://www.vmware.c...layer_pubs.html
___

- http://www.securityt....com/id/1038525
CVE Reference: https://nvd.nist.gov...l/CVE-2017-4915
May 19 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation Pro and Workstation Player 12.x ...
Impact: A local user on the host system can obtain root privileges on the host system.
Solution: The vendor has issued a fix (12.5.6)...

- http://www.securityt....com/id/1038526
CVE Reference: https://nvd.nist.gov...l/CVE-2017-4916
May 19 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation Pro and Workstation Player 12.x ...
Impact: A local user on the host system can cause denial of service conditions on the host system.
Solution: The vendor has issued a fix (12.5.6)...
 

:ninja: :ninja:


Edited by AplusWebMaster, 30 May 2017 - 07:40 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#165 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 07 June 2017 - 05:06 AM

FYI...

VMSA-2017-0010 - vSphere Data Protection (VDP) updates address multiple security issues
- https://www.vmware.c...-2017-0010.html
2017-06-06
Severity: Critical
Summary: vSphere Data Protection (VDP) updates address multiple security issues
Relevant Products: vSphere Data Protection (VDP)
Problem Description: VDP Java deserialization issue
VDP contains a deserialization issue. Exploitation of this issue may allow a remote attacker to execute commands on the appliance...
VDP locally stores vCenter Server credentials using reversible encryption. This issue may allow plaintext credentials to be obtained...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vSphere Data Protection (VDP) 6.1.4
Downloads and Documentation:
- https://my.vmware.co...oadGroup=VDP614
- https://www.vmware.c...s/vdr_pubs.html
vSphere Data Protection (VDP) 6.0.5
Downloads and Documentation:  
- https://my.vmware.co...adGroup=VDP60_5
- https://www.vmware.c...s/vdr_pubs.html
___

- http://www.securityt....com/id/1038617
CVE Reference: CVE-2017-4914, CVE-2017-4917
Jun 6 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Data Protection 5.5.x, 5.8.x, 6.0.x, 6.1.x ...
Impact: A local user can obtain passwords on the target system.
A remote user can execute arbitrary code on the target system.
Solution: VMware has issued a fix (6.0.5, 6.1.4)...
___

- https://www.us-cert....ecurity-Updates
June 07, 2017
 

:ninja: :ninja:


Edited by AplusWebMaster, 07 June 2017 - 11:18 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#166 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 09 June 2017 - 07:48 AM

FYI...

VMSA-2017-0011 - Horizon View Client update addresses a command injection vuln
- https://www.vmware.c...-2017-0011.html
2017-06-08
Severity: Important
Summary: Horizon View Client update addresses a command injection vulnerability
Relevant Products: VMware Horizon View Client for Mac (View Client)
Problem Description: Horizon View Client command injection vulnerability
VMware Horizon View Client contains a command injection vulnerability in the service startup script. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on the Mac OSX system where the client is installed...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Horizon View Client: Downloads:
- https://my.vmware.co...=578&rPId=16682
Documentation:
- https://www.vmware.c...ients_pubs.html
___

- http://www.securityt....com/id/1038642
CVE Reference: CVE-2017-4918
Jun 8 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): View Client 2.x, 3.x, 4.x ...
Impact: A local user can obtain root privileges on the target system.
Solution: VMware has issued a fix (View Client 4.5)...
 

:ninja: :ninja:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#167 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 28 July 2017 - 04:45 AM

FYI...

VMSA-2017-0012 - VMware VIX API VM Direct Access Function security issue
- https://www.vmware.c...-2017-0012.html
2017-07-27
Summary: VMware VIX API allows for direct access to Guest Operating Systems (Guest OSs) by vSphere users with limited privileges.
Relevant Products: VMware vCenter Server
Problem Description: VMware VIX API VM Direct Access Function security issue  
The VMware VIX API has a functionality that allows for direct access to Guests OSs which is used by VMware Site Recovery Manager, VMware Update Manager, and VMware Infrastructure Navigator to manage Guest OSs. This functionality may be used by vSphere users with limited privileges to access a Guest OS without the need to authenticate. In order for vSphere users with limited privileges to use this functionality, they would need to have all three of the following privileges:         
  Virtual Machine -> Configuration -> Advanced            
  Virtual Machine -> Interaction ->                      
     Guest Operating System Management by VIX API                   
  Host -> Configuration -> Advanced Settings  
Workaround: Workarounds that remove the direct access to Guest OSs by vSphere users with limited privileges are listed in VMware Knowledge Base article 2151027.  
These workarounds are not relevant for vSphere users that are fully privileged. Typically they already have alternate ways to access Guest OSs.
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. Apply the workaround listed in VMware Knowledge Base article 2151027*.   
* https://kb.vmware.com/kb/2151027

- http://www.securityt....com/id/1039004
CVE Reference: CVE-2017-4919
Jul 27 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.5, 6.0, 6.5 ...
Impact: A remote authenticated vSphere user with limited privileges can gain access to the target guest system.
Solution: VMware has described a workaround in KB 2151027, available at:
- https://kb.vmware.com/kb/2151027
 

:ninja: :ninja:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#168 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 29 July 2017 - 05:07 AM

FYI...

VMSA-2017-0013 - VMware vCenter Server and Tools updates resolve multiple security vulns
- https://www.vmware.c...-2017-0013.html
2017-07-27
Summary: VMware vCenter Server and Tools updates resolve multiple security vulnerabilities
Relevant Products:
    VMware vCenter Server  
    VMware Tools
Problem Description:
a. Insecure library loading through LD_LIBRARY_PATH
VMware vCenter Server contains an insecure library loading issue that occurs due to the use of LD_LIBRARY_PATH variable in an unsafe manner. Successful exploitation of this issue may allow unprivileged host users to load a shared library that may lead to privilege escalation.      
Note: In order to exploit this issue an attacker should be able to trick the admin to execute wrapper scripts from a world writable directory...
b. Information disclosure via service startup script
VMware vCenter Server contains an information disclosure issue due to the service startup script using world writable directories as temporary storage for critical information. Successful exploitation of this issue may allow unprivileged host users to access certain critical information when the service gets restarted...
c. Information disclosure via vCenter Server Appliance file-based backup feature
VMware vCenter Server contains an information disclosure vulnerability. This issue may allow plaintext credentials to be obtained when using the vCenter Server Appliance file-based backup feature...
d. Local privilege escalation in VMware Tools
VMware Tools contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation...
Solution:
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
> VMware vCenter Server 6.5 U1
Downloads:
- https://my.vmware.co...=614&rPId=17343
Documentation:
- https://docs.vmware....here/index.html
> VMware Tools 10.0.9
Downloads and Documentation:  
- https://my.vmware.co...oup=VMTOOLS1009
___

- http://www.securityt....com/id/1039013
CVE Reference: CVE-2015-5191, CVE-2017-4921, CVE-2017-4922, CVE-2017-4923
Jul 28 2017
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): vCenter Server 6.5 VA; VMware Tools 9.x, 10.0.x ...
Impact: A local user on the guest system can gain elevated privileges on the guest system.
A local user on the host system can gain elevated privileges on the host system.
A local user can obtain potentially sensitive information on the target system.
A local user can obtain passwords on the target system.
Solution: VMware has issued a fix (vCenter Server 6.5 U1).
A fixed version of VMware Tools (10.0.9) is also available...
 

:ninja: :ninja:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#169 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,888 posts

Posted 13 August 2017 - 07:20 AM

FYI...

VMSA-2017-0014 - VMware NSX-V Edge updates address OSPF Protocol LSA DoS
- https://www.vmware.c...-2017-0014.html
2017-08-10
Summary: VMware NSX-V Edge updates address OSPF Protocol LSA DoS.
Relevant Products:
    VMware NSX-V Edge
Problem Description: VMware NSX-V Edge OSPF Protocol LSA Denial of Service
VMware NSX-V implementation of the OSPF protocol doesn’t correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity.
Note: The issue cannot be exploited in case the OSPF protocol is not configured. At setup time, no particular protocol is configured. For more information on static and dynamic routing for NSX Edge refer to the NSX Administration Guide, section Logical Router...
References: http://cve.mitre.org...e=CVE-2017-4920
NSX Administration Guide, section Logical Router:
- https://pubs.vmware....7CD9EA5104.html
 

:ninja:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.





4 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users


    Magpie (3)
Member of

Support SpywareInfo Forum - click the button
PayPal - The safer, easier way to pay online!