-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2013.0589.2
                VMware security updates for vCenter Server
                              21 October 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           vCenter Server
                   VirtualCenter
                   vCenter Server Appliance
                   Update Manager
                   ESXi
                   ESX
Publisher:         VMWare
Operating System:  Windows
                   VMWare ESX Server
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Cross-site Request Forgery      -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
                   Unauthorised Access             -- Existing Account      
                   Reduced Security                -- Unknown/Unspecified   
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-3107 CVE-2013-3080 CVE-2013-3079
                   CVE-2012-5887 CVE-2012-5886 CVE-2012-5885
                   CVE-2012-4534 CVE-2012-4431 CVE-2012-3546
                   CVE-2012-2733  

Reference:         ESB-2013.0533
                   ESB-2013.0511
                   ESB-2013.0466
                   ESB-2013.0412
                   ESB-2013.0386
                   ESB-2013.0380
                   ESB-2013.0379
                   ESB-2013.0364
                   ESB-2013.0359
                   ESB-2013.0225
                   ESB-2013.0224
                   ASB-2012.0144
                   ASB-2012.0143

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2013-0006.html

Revision History:  October 21 2013: Updated security advisory in conjunction with
                    the release of vCenter Server 5.0 Update 3
                   April   29 2013: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2013-0006.1
Synopsis:    VMware security updates for vCenter Server
Issue date:  2013-04-25
Updated on:  2013-10-17
CVE number:  CVE-2013-3107, CVE-2013-3079, CVE-2013-3080
             --tomcat --
             CVE-2012-5885, CVE-2012-5886, CVE-2012-5887, CVE-2012-2733,
             CVE-2012-4534, CVE-2012-3546, CVE-2012-4431            
             --JRE --
             See references
- - -----------------------------------------------------------------------

1. Summary

   VMware has updated vCenter Server Appliance (vCSA) and vCenter 
   Server running on Windows to address multiple security 
   vulnerabilities.  

2. Relevant releases

   vCenter Server 5.1 without Update 1
   vCenter Server 5.0 without Update 3

   Update Manager 5.0 without Update 3

3. Problem Description

   a. vCenter Server AD anonymous LDAP binding credential by-pass


      vCenter Server when deployed in an environment that uses 
      Active Directory (AD) with anonymous LDAP binding enabled
      doesn't properly handle login credentials. In this
      environment, authenticating to vCenter Server with a valid
      user name and a blank password may be successful even if 
      a non-blank password is required for the account. 

      The issue is present on vCenter Server 5.1, 5.1a and 5.1b
      if AD anonymous LDAP binding is enabled. The issue is 
      addressed in vCenter Server 5.1 Update 1 by removing the
      possibility to authenticate using blank passwords. This
      change in the authentication mechanism is present 
      regardless if anonymous binding is enabled or not.

      Workaround
      The workaround is to discontinue the use of AD anonymous
      LDAP binding if it is enabled in your environment. AD 
      anonymous LDAP binding is not enabled by default. The TechNet
      article listed in the references section explains how to 
      check for anonymous binding (look for "anonymous binding"
      in the article: anonymous binding is enabled if the seventh
      bit of the dsHeuristics attribute is set to 2)


      The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
      assigned the name CVE-2013-3107 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available. 


        VMware		Product	Running	Replace with/
        Product		Version	on	Apply Patch
        =============	=======	=======	=================
        vCenter Server	5.1	Any	5.1 Update 1
        vCenter Server	5.0	Any	not applicable
	vCenter	Server	4.1	Windows	not applicable
	vCenter	Server	4.0	Windows	not applicable
	VirtualCenter	2.5	Windows	not applicable
	

   b. vCenter Server Appliance arbitrary file execution


      The vCenter Server Appliance (vCSA) contains a remote code 
      vulnerability. An authenticated attacker with access to the 
      Virtual Appliance Management Interface (VAMI) may run 
      an existing file as root. In the default vCSA setup, 
      authentication to vCSA is limited to root since root 
      is the only defined user.

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
      assigned the name CVE-2013-3079 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available. 


        VMware		Product	Running	Replace with/
        Product		Version	on	Apply Patch
        =============	=======	=======	=================
        vCSA 		5.1	Linux 	5.1 Update 1
	vCSA 		5.0 	Linux 	not affected

   c. vCenter Server Appliance arbitrary file upload

      The vCenter Server Appliance (vCSA) VAMI web interface 
      contains a vulnerability that allows an authenticated remote
      attacker to upload files to an arbitrary location creating new
      files or overwriting existing files. Replacing certain files
      may result in a denial of service condition or code execution.
      In the default vCSA setup, authentication to vCSA is limited to
      root since root is the only defined user.


      The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
      assigned the name CVE-2013-3080 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available. 


        VMware		Product	Running	Replace with/
        Product		Version	on	Apply Patch
        =============	=======	=======	=================
        vCSA 		5.1	Linux 	5.1 Update 1
	vCSA 		5.0 	Linux 	not affected


   d. vCenter, Update Manager, Oracle (Sun) JRE update 1.6.0_37
      
      Oracle (Sun) JRE is updated to version 1.6.0_37, which addresses
      multiple security issues that existed in earlier releases of
      Oracle (Sun) JRE. 

      Oracle has documented the CVE identifiers that are addressed
      in JRE 1.6.0_37 in the Oracle Java SE Critical Patch Update
      Advisory of October 2012. The References section provides a
      link to this advisory. 

      Column 4 of the following table lists the action required to 
      remediate the vulnerability in each release, if a solution is
      available. 

        VMware		Product	Running	Replace with/
        Product		Version	on	Apply Patch
        =============	=======	=======	=================
        vCenter	Server	5.1	Windows	5.1 Update 1
        vCenter	Server	5.0	Windows	See VMSA-2013-0012
	vCenter	Server	4.1	Windows	patch pending
	vCenter	Server	4.0	Windows	not applicable **
	VirtualCenter	2.5	Windows	not applicable **

	Update Manager	5.1	Windows	5.1 Update 1
	Update Manager	5.0	Windows	See VMSA-2013-0012
	Update Manager	4.1	Windows	not applicable **
	Update Manager	4.0	Windows	not applicable **

	hosted *	any	any	not affected

	ESXi		any	ESXi	not applicable

	ESX		4.1	ESX	Patch Pending
	ESX		4.0	ESX	not applicable **
        ESX		3.5	ESX	not applicable **

	* hosted products are VMware Workstation, Player, ACE, Fusion. 

	** this product uses the Oracle (Sun) JRE 1.5.0 family


   e. vCenter Server tc-server 2.8.1 / Apache Tomcat 6.0.36 update

      tc-server has been updated to version 2.8.1 to address multiple
      security issues. This version of tc-server includes Apache 
      Tomcat 6.0.36 

      The Common Vulnerabilities and Exposures project (cve.mitre.org) 
      has assigned the names CVE-2012-5885, CVE-2012-5886, CVE-2012-5887,
      CVE-2012-2733, CVE-2012-4534, CVE-2012-3546 and CVE-2012-4431
      to these issues. 

        VMware	Product	Running	Replace with/
        Product	Version	on	Apply Patch
        =============	=======	=======	=================
        vCenter	Server	5.1	Any     5.1 Update 1 *
	vCenter	Server	5.0	Any	not affected
        vCenter	Server	4.1	Windows	not affected
        vCenter	Server	4.0	Windows	not affected
	VirtualCenter	2.5	Windows	not applicable *** 	
 	 	 
        hosted **	any	any	not affected
 	 	 	 
        ESXi		any	ESXi	not applicable
 	 	 	 
        ESX		4.1	ESX	not affected
        ESX		4.0	ESX	not affected
        ESX		3.5	ESX	not applicable ***
        

      * Only CVE-2012-2733 and CVE-2012-4534 affect vCenter Server 5.1

      ** hosted products are VMware Workstation, Player, ACE, Fusion. 

      *** this product uses the Apache Tomcat 5.5 family

 4. Solution

    Please review the patch/release notes for your product and 
    version and verify the checksum of your downloaded file. 

   vCenter Server 5.1 Update 1 
   --------------------
   Download link: 
  
  
https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_
vsphere/5_1 

   Release Notes: 
  
  
http://www.vmware.com/support/vsphere5/doc/vsphere-vcenter-server-51u1-rele
ase-notes.html

5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3107
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3079
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3080

   --------jre --------
   Oracle Java SE Critical Patch Update Advisory of October 2012 
  
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.ht
ml

   --------tomcat --------
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2733
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4534
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4431

   TechNet: How Active Directory Searches Work
   http://technet.microsoft.com/en-us/library/cc755809.aspx


- - -----------------------------------------------------------------------

6. Change log

   2013-04-25 VMSA-2013-0006
   Initial security advisory in conjunction with the release of VMware
   vSphere 5.1 Update 1 on 2013-04-25.

   2013-10-17 VMSA-2012-0006.1 
   Updated security advisory in conjunction with the release of vCenter
   Server 5.0 Update 3 on 2013-10-17 

- - -----------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
   
   This Security Advisory is posted to the following lists:
   
     * security-announce at lists.vmware.com
     * bugtraq at securityfocus.com
     * full-disclosure at lists.grok.org.uk
   
   E-mail:  security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055
   
   VMware Security Advisories
   http://www.vmware.com/security/advisories
   
   VMware security response policy
   http://www.vmware.com/support/policies/security_response.html
   
   General support life cycle policy
   http://www.vmware.com/support/policies/eos.html
   
   VMware Infrastructure support life cycle policy
   http://www.vmware.com/support/policies/eos_vi.html
   
   Copyright 2013 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFSXk3JDEcm8Vbi9kMRAsQmAKDIBCF5S+GWsQv+hr4VyZ1KDZpG9QCgiC6r
by9pS/opetfW/HxIsRhZsbc=
=TOig
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=t5+4
-----END PGP SIGNATURE-----