Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

                   ESB-2008.0891 -- [VMware ESX][Linux]
        Updated ESXi and ESX 3.5 packages address critical security
                            issue in openwsman
                             22 September 2008


        AusCERT Security Bulletin Summary

Product:              openwsman
Publisher:            VMware
Operating System:     VMWare ESX Server
                      Linux variants
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-2234

Ref:                  http://www.vmware.com/security/advisories/VMSA-2008-0015.html

Comment: This advisory references vulnerabilities in products which run on
         platforms other than ESX. It is recommended that administrators
         running openwsman check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

Hash: SHA1

- - ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2008-0015
Synopsis:          Updated ESXi and ESX 3.5 packages address critical
                   security issue in openwsman
Issue date:        2008-09-18
Updated on:        2008-09-18 (initial release of advisory)
CVE numbers:       CVE-2008-2234
- - --------------------------------------------------------------------------

1. Summary

    Updated ESXi and ESX 3.5 packages address critical security issue in

2. Relevant releases

    VMware ESXi 3.5 Update 2 without patch ESXe350-200808501-I-SG

    VMware ESX  3.5 Update 2 without patch ESX350-200808413-SG

3. Problem Description

  a.  Updated Openwsman

    Openwsman is a system management platform that implements the Web
    Services Management protocol (WS-Management). It is installed and
    running by default. It is used in the VMware Management Service
    Console and in ESXi.

    The openwsman 2.0.0 management service on ESX 3.5 and ESXi 3.5 is
    vulnerable to the following issue found by the SuSE Security-Team:
    - Two remote buffer overflows while decoding the HTTP basic
      authentication header

    This vulnerability could potentially be exploited by users without
    valid login credentials.
    Openwsman before 2.0.0 is not vulnerable to this issue. The ESXi
    3.5 patch ESXe350-200808201-O-UG updated openwsman to version 2.0.0.
    The ESX 3.5 patch ESX350-200808205-UG updated openwsman to version
    2.0.0. These patches are installed as part of the ESX and ESXi
    Upgrade 2 release. The ESX patch can be installed individually.

    Version Information and Workaround
    The following VMware KB articles provide information on how to
    obtain the version of openwsman in your environment and what a
    possible workaround for the issue might be.
    ESXi 3.5
      Refer to the VMware KB article at http://kb.vmware.com/kb/1005818.
    ESX 3.5
      Refer to the VMware KB article at http://kb.vmware.com/kb/1006878.

    Note: This vulnerability can be exploited remotely only if the
          attacker has access to the service console network.
          Security best practices provided by VMware recommend that the
          service console be isolated from the VM network. Please see
          http://www.vmware.com/resources/techresources/726 for more
          information on VMware security best practices.

    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the name CVE-2008-2234 this issue.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected
    hosted *       any       any      not affected

    ESXi           3.5 **    ESXi     ESXe350-200808501-I-SG
    ESXi           3.5 ***   ESXi     not affected

    ESX            3.5 **    ESX      ESX350-200808413-SG
    ESX            3.5 ***   ESX      not affected
    ESX            3.0.3     ESX      not affected
    ESX            3.0.2     ESX      not affected
    ESX            3.0.1     ESX      not affected
    ESX            2.5.5     ESX      not affected
    ESX            2.5.4     ESX      not affected

    * hosted products are VMware Workstation, Player, ACE, Server, Fusion.
    ** ESX and ESXi running openwsman 2.0.0
    *** ESX and ESXi running version of openwsman before 2.0.0
    Note: When the SuSE Security-Team reported this openwsman security
          issue, it also reported the openwsman issue described in
          CVE-2008-2233. No VMware product is affected by the security
          vulnerability described in CVE-2008-2233.

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.


   ESXi 3.5 patch ESXe350-200808501-O-SG
   md5sum: bee3e2da8054e46686e446e8dc49040e

   NOTE: ESXe350-200808501-O-SG contains the following patch bundles:
   ESXe350-200808501-I-SG, ESXe350-200808502-T-BG, and


   ESX 3.5 patch ESX350-200808413-SG
   md5sum: 2a683d099c28315475db53bd459dcc07

5. References

   CVE numbers

- - ------------------------------------------------------------------------
6. Change log

2008-09-18  VMSA-2008-0015
Initial security advisory after the release of ESXi 3.5 and ESX 3.5
patches on 2008-09-18.
- - ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center

VMware security response policy

General support life cycle policy

VMware Infrastructure support life cycle policy

Copyright 2008 VMware Inc.  All rights reserved.

Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.

Comment: http://www.auscert.org.au/render.html?it=1967