-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2013.0761.2
      VMware ESX third party update for Service Console package sudo
                              9 December 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          VMware ESX
Publisher:        VMware
Operating System: VMware ESX Server
Impact/Access:    Overwrite Arbitrary Files -- Existing Account
                  Unauthorised Access       -- Existing Account
Resolution:       Patch/Upgrade
CVE Names:        CVE-2012-3440 CVE-2012-2337 

Reference:        ASB-2012.0074.2
                  ESB-2012.0744

Revision History: December  9 2013: Security advisory update in conjunction 
                                    with the release of ESX 4.1 patches on 
                                    2013-12-05
                  May      31 2013: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
             VMware Security Advisory

Advisory ID: VMSA-2013-0007.1
Synopsis:    VMware ESX third party update for Service Console package sudo
Issue date:  2013-05-30
Updated on:  2013-12-05
CVE number:  CVE-2012-2337, CVE-2012-3440
- - - -----------------------------------------------------------------------

1. Summary

    VMware ESX third party update for Service Console package sudo

2. Relevant releases

    VMware ESX 4.1 without patch ESX410-201312001
    VMware ESX 4.0 without patch ESX400-201305001

3. Problem Description

  a. Service Console update for sudo
      
      The service console package sudo is updated to version 
      1.7.2p1-14.el5_8.3

      The Common Vulnerabilities and Exposures project (cve.mitre.org) 
      has assigned the name CVE-2012-2337 and CVE-2012-3440 to the issues 
      addressed in this update. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available. 

        VMware		Product	Running	Replace with/
        Product		Version	on	Apply Patch
        =============	=======	=======	=================
	ESXi		any	ESXi	not affected

	ESX		4.1	ESX	ESX410-201312401-SG
	ESX		4.0	ESX	ESX400-201305402-SG

 4. Solution

      Please review the patch/release notes for your product and version 
      and verify the checksum of your downloaded file. 

      ESXi and ESX 
      --------------------------
      http://www.vmware.com/patchmgr/download.portal


      ESX 4.1
      -------
      File: ESX410-201312001.zip
      Build: 1368001
      md5sum: c35763a84db169dd0285442d4129cc18
      sha1sum: ee8e1b8d2d383422ff0dde04749c5d89e77d8e40
      http://kb.vmware.com/kb/2061209
      ESX410-201312001 contains ESX410-201312401-SG

      ESX 4.0 
      -------
      File: ESX400-201305001.zip 
      Build: 1070634
      md5sum: c9ac91d3d803c7b7cb9df401c20b91c0 
      sha1sum: 7f5cef274c709248daa56d8c0e6fcc1ba86ae411
      https://kb.vmware.com/kb/2044240
      ESX400-201305001 contains ESX400-201305402-SG
      
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3440


- - - -----------------------------------------------------------------------

6. Change log

   2013-05-30 VMSA-2013-0007
   Initial security advisory in conjunction with the release of ESX 4.0
   patches on 2013-05-30.

   2013-12-05 VMSA-2013-0007.1
   Security advisory update in conjunction with the release of ESX 4.1
   patches on 2013-12-05.

- - - -----------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
   
   This Security Advisory is posted to the following lists:
   
     * security-announce at lists.vmware.com
     * bugtraq at securityfocus.com
     * full-disclosure at lists.grok.org.uk
   
   E-mail:  security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055
   
   VMware Security Advisories
   http://www.vmware.com/security/advisories
   
   VMware security response policy
   http://www.vmware.com/support/policies/security_response.html
   
   General support life cycle policy
   http://www.vmware.com/support/policies/eos.html
   
   VMware Infrastructure support life cycle policy
   http://www.vmware.com/support/policies/eos_vi.html
   
   Copyright 2013 VMware Inc. All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iEYEARECAAYFAlKhUgMACgkQDEcm8Vbi9kOk1QCfSIni5b2S0/kH5GOrBijlsGIq
HgoAoJqxCyke7a/OO3aGzBXZaZLZeLa4
=8fBO
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=J91l
-----END PGP SIGNATURE-----