-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2012.0415.4
                 VMware ESX updates to ESX Service Console
                              8 January 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          VMware ESX 4.1
Publisher:        VMWare
Operating System: VMWare ESX Server
Impact/Access:    Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                  Root Compromise                 -- Existing Account      
                  Denial of Service               -- Remote/Unauthenticated
Resolution:       Patch/Upgrade
CVE Names:        CVE-2012-0028 CVE-2011-4348 CVE-2011-3919
                  CVE-2011-3905 CVE-2011-3191 CVE-2011-2834
                  CVE-2011-1944 CVE-2011-0216 CVE-2010-4008

Reference:        ASB-2012.0004
                  ESB-2012.0333
                  ESB-2012.0150
                  ESB-2011.1208
                  ESB-2011.0749
                  ASB-2011.0114.2
                  ESB-2011.0923.2

Revision History: January    8 2013: Corrected error in body of bulletin
                  September 18 2012: Updated security advisory in conjunction 
                                     with the release of vSphere 4.0 U4a
                  April     30 2012: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2012-0008.1
Synopsis:    VMware ESX updates to ESX Service Console
Issue date:  2012-04-26
Updated on:  2012-09-13
CVE numbers: CVE-2010-4008, CVE-2011-0216, CVE-2011-1944, CVE-2011-2834,
             CVE-2011-3191, CVE-2011-4348, CVE-2012-0028, CVE-2011-3905,
             CVE-2011-3919
 -----------------------------------------------------------------------
1. Summary

   VMware ESX updates to ESX Service Console.

2. Relevant releases

   ESX 4.1 without patches ESX410-201204401-SG,ESX410-201204402-SG

3. Problem Description

 a. ESX third party update for Service Console kernel

    The ESX Service Console Operating System (COS) kernel is updated
    which addresses several security issues in the COS kernel.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2011-3191, CVE-2011-4348 and CVE-2012-0028 to
    these issues.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.1       ESX      ESX410-201204401-SG
    ESX            4.0       ESX      see VMSA-2012-0013 **
    ESX            3.5       ESX      not applicable

  * hosted products are VMware Workstation, Player, ACE, Fusion.

  ** Two of the three issues, CVE-2011-3191 and CVE-2011-4348, have
     already been addressed on ESX 4.0 in an earlier kernel patch. See
     VMSA-2012-0006 for details.
     CVE-2012-0028 is addressed by a later kernel patch, see
     VMSA-2012-0013.

 b. Updated ESX Service Console package libxml2

    The ESX Console Operating System (COS) libxml2 rpms are updated to
    the following versions libxml2-2.6.26-2.1.12.el5_7.2 and
    libxml2-python-2.6.26-2.1.12.el5_7.2 which addresses several
    security issues.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2010-4008, CVE-2011-0216, CVE-2011-1944,
    CVE-2011-2834, CVE-2011-3905, CVE-2011-3919 to these issues.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    hosted *       any       any      not affected

    ESXi           any       ESXi     not affected

    ESX            4.1       ESX      ESX410-201204402-SG
    ESX            4.0       ESX      see VMSA-2012-0013
    ESX            3.5       ESX      not applicable

  * hosted products are VMware Workstation, Player, ACE, Fusion.
 
4. Solution

   Please review the patch/release notes for your product and version
   and verify the checksum of your downloaded file.
    
   ESX 4.1
   -------
   ESX410-201204001
   md5sum: 7994635547b375b51422b1a166c6e214
   sha1sum: 9d5f3c9cbc53a9e03524b9bf0935c71f3dadf620
   http://kb.vmware.com/kb/2013057

   ESX410-201204001 contains ESX410-201204401-SG and
   ESX410-201204402-SG
     
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0216
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4348
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0028
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3905
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919

 -----------------------------------------------------------------------

6. Change log

   2012-04-26 VMSA-2012-0008
   Initial security advisory in conjunction with the release of
   patches for ESX 4.1 on 2012-04-26.

   2012-09-12 VMSA-2012-0008.1
   Updated security advisory in conjunction with the release of
   vSphere 4.0 U4a on 2012-09-12 and ESX 4.0 patches on 2012-09-13.

 -----------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2012 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFQUsEjDEcm8Vbi9kMRAtg9AJ9z4Jw361qaXe7d1iwZxNygKorSTwCfQQuG
B27c0dbY1JBB0tdg/K3LVPw=
=SMA9
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=o9oQ
-----END PGP SIGNATURE-----