-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2010.0314.2
              ESX Service Console updates for samba and acpid
                             16 February 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           samba
                   acpid
Publisher:         VMWare
Operating System:  VMWare ESX Server
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Existing Account      
                   Unauthorised Access      -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2009-2948 CVE-2009-2906 CVE-2009-2813
                   CVE-2009-1888 CVE-2009-0798 

Reference:         ESB-2009.1361
                   ESB-2009.0414

Original Bulletin: 
   http://www.vmware.com/security/advisories/VMSA-2010-0006.html

Revision History:  February 16 2011: Updated after release of ESX 3.0.3 
                                     patches on 2011-02-14
                   April     6 2010: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2010-0006.1
Synopsis:          ESX Service Console updates for samba and acpid
Issue date:        2010-04-01
Updated on:        2011-02-14
CVE numbers:       CVE-2009-2906, CVE-2009-1888, CVE-2009-2813,
                   CVE-2009-2948, CVE-2009-0798

- - ------------------------------------------------------------------------

1. Summary

   ESX Service Console updates for samba and acpid packages.

2. Relevant releases

   VMware ESX 4.0.0 without patch ESX400-201003405-SG,
                                  ESX400-201003403-SG

   VMWare ESX 3.0.3 without patch ESX303-201102402-SG.

   Notes:

   Effective May 2010, VMware's patch and update release program during
   Extended Support will be continued with the condition that all
   subsequent patch and update releases will be based on the latest
   baseline release version as of May 2010 (i.e. ESX 3.0.3 Update 1,
   ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section
   "End of Product Availability FAQs" at
   http://www.vmware.com/support/policies/lifecycle/vi/faq.html for
   details.

   Extended support for ESX 2.5.5 ends on 2010-06-15. Users should plan
   to upgrade to at least ESX 3.0.3 Update 1 and preferably to the
   newest release available.

   Extended support for ESX 3.0.3 ends on 2011-12-10. Users should plan
   to upgrade to at least ESX 3.5 Update 5 and preferably to the newest
   release available.

3. Problem Description

 a. Service Console update for samba to 3.0.33-3.15.el5_4.1

    This update changes the samba packages to
    samba-client-3.0.33-3.15.el5_4.1 and
    samba-common-3.0.33-3.15.el5_4.1. These versions include fixes for
    security issues that were first fixed in
    samba-client-3.0.33-0.18.el4_8 and samba-common-3.0.33-0.18.el4_8.
     
    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the names CVE-2009-2906, CVE-2009-1888,CVE-2009-2813
    and CVE-2009-2948 to these issues.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.0       ESX      ESX400-201003405-SG
    ESX            3.5       ESX      patch pending
    ESX            3.0.3     ESX      see VMSA-2010-0019.1
    ESX            2.5.5     ESX      no patch planned

    vMA            4.0       RHEL5    patch pending

  * hosted products are VMware Workstation, Player, ACE, Server, Fusion.

 b. Service Console update for acpid to1.0.4-9.el5_4.2
 
    This updates changes the the acpid package to acpid-1.0.4-9.el5_4.2.
    This version includes the fix for a security issue that was first
    fixed in acpid-1.0.4-7.el5_4.1.  

    The Common Vulnerabilities and Exposures Project (cve.mitre.org)
    has assigned the name CVE-2009-0798 to this issue.

    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VirtualCenter  any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.0       ESX      ESX400-201003403-SG
    ESX            3.5       ESX      not affected
    ESX            3.0.3     ESX      not affected
    ESX            2.5.5     ESX      not affected

    vMA            4.0       RHEL5    patch pending

  * hosted products are VMware Workstation, Player, ACE, Server, Fusion.

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   ESX 4.0
   -------
 
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-195-20100324-069
238/ESX400-201003001.zip
   md5sum: c7c0f287d5728289fe2903be48d8d501
   sha1sum: d90badd89247ccc96a02001b6d697bf39fad9e7c
   http://kb.vmware.com/kb/1019833

   Note: ESX400-201003001 contains the following security bulletins
   ESX400-201003403-SG, and ESX400-201003405-SG

   To install an individual bulletin use esxupdate with the -b option.
   esxupdate --bundle ESX400-201003403.zip -b ESX400-201003405-SG update


5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798

- - ------------------------------------------------------------------------
6. Change log

2010-04-01  VMSA-2010-0006
Initial security advisory after release of bulletins for ESX 4.0
on 2010-04-01.
2011-02-14  VMSA-2010-0006.1
Updated after release of ESX 3.0.3 patches on 2011-02-14.

- - -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNWhQAS2KysvBH1xkRAvLKAJwJvvv8qQalcArZ2KKRvo/IW8MxtgCbBXwH
WauDgRX4CCsWIOhDc+Rvitg=
=I8Na
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFNW1hI/iFOrG6YcBERAueBAKDOXnVYOEcyrr9wIoPc6qV2e74FJACff9bB
88MJNoKtFETdtu6pleL0QRg=
=OK4W
-----END PGP SIGNATURE-----