Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0415.4 VMware ESX updates to ESX Service Console 8 January 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware ESX 4.1 Publisher: VMWare Operating System: VMWare ESX Server Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Root Compromise -- Existing Account Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2012-0028 CVE-2011-4348 CVE-2011-3919 CVE-2011-3905 CVE-2011-3191 CVE-2011-2834 CVE-2011-1944 CVE-2011-0216 CVE-2010-4008 Reference: ASB-2012.0004 ESB-2012.0333 ESB-2012.0150 ESB-2011.1208 ESB-2011.0749 ASB-2011.0114.2 ESB-2011.0923.2 Revision History: January 8 2013: Corrected error in body of bulletin September 18 2012: Updated security advisory in conjunction with the release of vSphere 4.0 U4a April 30 2012: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ---------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2012-0008.1 Synopsis: VMware ESX updates to ESX Service Console Issue date: 2012-04-26 Updated on: 2012-09-13 CVE numbers: CVE-2010-4008, CVE-2011-0216, CVE-2011-1944, CVE-2011-2834, CVE-2011-3191, CVE-2011-4348, CVE-2012-0028, CVE-2011-3905, CVE-2011-3919 ----------------------------------------------------------------------- 1. Summary VMware ESX updates to ESX Service Console. 2. Relevant releases ESX 4.1 without patches ESX410-201204401-SG,ESX410-201204402-SG 3. Problem Description a. ESX third party update for Service Console kernel The ESX Service Console Operating System (COS) kernel is updated which addresses several security issues in the COS kernel. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2011-3191, CVE-2011-4348 and CVE-2012-0028 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not affected hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201204401-SG ESX 4.0 ESX see VMSA-2012-0013 ** ESX 3.5 ESX not applicable * hosted products are VMware Workstation, Player, ACE, Fusion. ** Two of the three issues, CVE-2011-3191 and CVE-2011-4348, have already been addressed on ESX 4.0 in an earlier kernel patch. See VMSA-2012-0006 for details. CVE-2012-0028 is addressed by a later kernel patch, see VMSA-2012-0013. b. Updated ESX Service Console package libxml2 The ESX Console Operating System (COS) libxml2 rpms are updated to the following versions libxml2-2.6.26-2.1.12.el5_7.2 and libxml2-python-2.6.26-2.1.12.el5_7.2 which addresses several security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-4008, CVE-2011-0216, CVE-2011-1944, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919 to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= vCenter any Windows not affected hosted * any any not affected ESXi any ESXi not affected ESX 4.1 ESX ESX410-201204402-SG ESX 4.0 ESX see VMSA-2012-0013 ESX 3.5 ESX not applicable * hosted products are VMware Workstation, Player, ACE, Fusion. 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. ESX 4.1 ------- ESX410-201204001 md5sum: 7994635547b375b51422b1a166c6e214 sha1sum: 9d5f3c9cbc53a9e03524b9bf0935c71f3dadf620 http://kb.vmware.com/kb/2013057 ESX410-201204001 contains ESX410-201204401-SG and ESX410-201204402-SG 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0216 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4348 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0028 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3905 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919 ----------------------------------------------------------------------- 6. Change log 2012-04-26 VMSA-2012-0008 Initial security advisory in conjunction with the release of patches for ESX 4.1 on 2012-04-26. 2012-09-12 VMSA-2012-0008.1 Updated security advisory in conjunction with the release of vSphere 4.0 U4a on 2012-09-12 and ESX 4.0 patches on 2012-09-13. ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2012 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8 wj8DBQFQUsEjDEcm8Vbi9kMRAtg9AJ9z4Jw361qaXe7d1iwZxNygKorSTwCfQQuG B27c0dbY1JBB0tdg/K3LVPw= =SMA9 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUOu+ne4yVqjM2NGpAQISSQ//Rt70Z0dwNppR8iTm8dtaqR49aw+c9j88 ks7GlRx47LXz/KCdrAJU31ZwwdTpC/MBybad524EwPhVCJ+BGUMv4gW1Draok7Zh 31AdGpqctDY0aB1LAyRtP9WG8rHahgSVnjud66vlTM5wgNoqxUbFCXiZW9zQr9BV NsFOJlHVbhi5DdFHAXN7BpQU0errPXKVX8Db+3w+iI3Idff/9MnTgJLV/j6gepJZ 9LVR52YIDcLzNeuh2IpTH/TaKNhJQ8cSf5By4ZY5hYGQhtrz9wS7W9d+04rzviHa YjEbXOCdIOJZLbmOnHQUUi0GAJhRvfR+0Edl1JOs3mq8X322W5IuGF92S+x/zbEB VE9iAHOcjSZxBQVjM8P42uACWu5J7tm6Doc7hh28MO2N7rZoB3wEvsEajge3NqNu LU6yii9z7S7cY+jQBFM92H7tkRZg1uonOwRsE755SlZVOOwjkxbbrqpAtwpS5Rt5 HHV1qLlVjD3URdi8wM/i9ETh53x4lRwVMwlKZLm+Z88us0RLpfE780reoxN5QTJ4 If8ptQACEttlNCiU16aKDYpU5KYal57TRsSt8OI+qkdXGrV9+OG33bOLb/gD19aI OiHzpjAr0aLiAfZomIObK82Qjcqh7WN4P8EsMds4I/3k+WOC/50zx+yBASQPojaD 5aYBEQY3xeg= =o9oQ -----END PGP SIGNATURE-----