Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0796 -- [Win]
   Updated VirtualCenter addresses User Account Disclosure Vulnerability
                              13 August 2008


        AusCERT Security Bulletin Summary

Product:              VirtualCenter 2.5 previous to Update 2
                      VirutalCenter 2.0.2 previous to Update 5
Publisher:            VMware
Operating System:     Windows
Impact:               Access Confidential Data
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-3514

- --------------------------BEGIN INCLUDED TEXT--------------------

Hash: SHA1

- - ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2008-0012
Synopsis:          Updated VirtualCenter addresses User Account
                   Disclosure Vulnerability
Issue date:        2008-08-12
Updated on:        2008-08-12 (initial release of advisory)
CVE numbers:       CVE-2008-3514
- - ------------------------------------------------------------------------

1. Summary

   Updated VirtualCenter addresses User Account Disclosure Vulnerability

2. Relevant releases

   VirtualCenter 2.5 previous to Update 2
   VirutalCenter 2.0.2 previous to Update 5

3. VirtualCenter User Account Disclosure Vulnerability

   An information disclosure vulnerability is present in VirtualCenter.
   Exploitation of this flaw might result in disclosure of the user
   names of system accounts.

   VMware would like to thank Brett Moore of Insomnia Security for
   reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org)
   has assigned the name CVE-2008-3514 to this issue.

   VMware         Product   Running  Replace with/
   Product        Version   on       Apply Patch
   =============  ========  =======  =================
   VirtualCenter  2.5       Windows  VirtualCenter 2.5 Update 2
   VirtualCenter  2.0.2     Windows  VirtualCenter 2.0.2 Update 5

   hosted *       any       any      not applicable

   ESX(i)         any       ESX(i)   not applicable
   ESX            any       ESX      not applicable
   * hosted products are VMware Workstation, Player, ACE, Server, Fusion

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   VMware VirtualCenter 2.5 Update 2 build 104263
   DVD iso image
   md5sum: 83de404fa073bc1fde9acd080f21e688
   Zip file
   md5sum: 3297f1e47c6b018ac8190f11bd022d5b
   Release Notes

   VMware VirtualCenter 2.0.2 Update 5 build 104182
   DVD iso image
   md5sum: 5fee5d2d97b482e0d0cb47da7d8e7c34
   Zip file
   md5sum: cd468aab309745c12ee5516652aafbcb
   Release Notes
5. References

   CVE numbers

- - ------------------------------------------------------------------------
6. Change log

2008-08-12  VMSA-2008-0012    
Initial release following release of VirtualCenter 2.0.2 Update 5

- - ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center

VMware security response policy

General support life cycle policy

VMware Infrastructure support life cycle policy

Copyright 2008 VMware Inc.  All rights reserved.

Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.

Comment: http://www.auscert.org.au/render.html?it=1967