Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0071 VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues 20 January 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Workstation VMware Player VMware Fusion VMware ESXi VMware ESX vCloud Directory Publisher: VMware Operating System: VMware ESX Server Windows OS X Impact/Access: Denial of Service -- Remote/Unauthenticated Cross-site Request Forgery -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-1211 CVE-2014-1208 CVE-2014-1207 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ----------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2014-0001 Synopsis: VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues Issue date: 2014-01-16 Updated on: 2014-01-16 (initial advisory) CVE numbers: CVE-2014-1207, CVE-2014-1208, CVE-2014-1211 - - ----------------------------------------------------------------------- 1. Summary VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues. 2. Relevant releases VMware Workstation 9.x prior to version 9.0 VMware Player 5.x prior to version 5.0 VMware Fusion 5.x prior to version 5.0 VMware ESXi 5.1 without patch ESXi510-201401101 VMware ESXi 5.0 without patch ESXi500-201310101 VMware ESXi 4.1 without patch ESXi410-201312401 VMware ESXi 4.0 without patch ESXi400-201310401 VMware ESX 4.1 without patch ESX410-201312401 VMware ESX 4.0 without patch ESX400-201310401 vCloud Director 5.1.x prior to version 5.1.3 3. Problem Description a. VMware ESXi and ESX NFC NULL pointer dereference VMware ESXi and ESX contain a NULL pointer dereference in the handling of the Network File Copy (NFC) traffic. To exploit this vulnerability, an attacker must intercept and modify the NFC traffic between ESXi/ESX and the client. Exploitation of the issue may lead to a Denial of Service. To reduce the likelihood of exploitation, vSphere components should be deployed on an isolated management network. VMware would like to thank Alex Chapman of Context Information Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1207 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server any any not affected hosted* any any not affected ESXi 5.5 ESXi not affected ESXi 5.1 ESXi ESXi510-201401101-SG ESXi 5.0 ESXi ESXi500-201310101-SG ESXi 4.1 ESXi ESXi410-201312401-SG ESXi 4.0 ESXi ESXi400-201310401-SG ESX 4.1 ESX ESX410-201312401-SG ESX 4.0 ESX ESX400-201310401-SG * hosted products are VMware Workstation, Player and Fusion. b. VMware VMX process denial of service vulnerability Due to a flaw in the handling of invalid ports, it is possible to cause the VMX process to fail. This vulnerability may allow a guest user to affect the VMX process resulting in a partial denial of service on the host. VMware would like to thank Recurity Labs GmbH and the Bundesamt Sicherheit in der Informationstechnik (BSI) for reporting this issue to us The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1208 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCenter Server any any not affected Workstation 10.0 any not affected Workstation 9.0 any 9.0.1 or later Player 6.0 any not affected Player 5.0 any 5.0.1 or later Fusion 6.0 Mac OS/X not affected Fusion 5.0 Mac OS/X 5.0.1 or later ESXi 5.5 ESXi not affected ESXi 5.1 ESXi ESXi510-201401101-SG ESXi 5.0 ESXi ESXi500-201310101-SG ESXi 4.1 ESXi ESXi410-201312401-SG ESXi 4.0 ESXi ESXi400-201310401-SG ESX 4.1 ESX ESX410-201312401-SG ESX 4.0 ESX ESX410-201312401-SG c. VMware vCloud Director Cross Site Request Forgery (CSRF) VMware vCloud Director contains a vulnerability in the Hyper Text Transfer Protocol (http) session management. An attacker may trick an authenticated user to click a malicious link, which would result in the user being logged out. The user is able to immediately log back into the system. VMware would like to thank Mattia Folador for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1211 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= vCloud Director 5.5 any not affected vCloud Director 5.1.x any 5.1.3 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Workstation 9.x ---------------------- https://www.vmware.com/go/downloadworkstation VMware Player 5.x ------------------ https://www.vmware.com/go/downloadplayer Fusion 5.x ------------------ https://www.vmware.com/go/downloadfusion ESXi and ESX ------------------ https://www.vmware.com/patchmgr/download.portal ESXi 5.1 ------------------ File: update-from-esxi5.1-5.1_update02.zip md5sum: 462cb98dc011804d3bad85f54f6b8133 sha1sum: 0352bf0adc78ceead74c7ace256ed87705e64703 http://kb.vmware.com/kb/2062314 update-from-esxi5.1-5.1_update02 contains ESXi510-201401101-SG ESXi 5.0 ------------------ File: update-from-esxi5.0-5.0_update03.zip md5sum: 7e6185fa3238a4895613b39e57a2a94b sha1sum: aa3929d2c8183aeaecdc238cbbf4d270bd70dd07 http://kb.vmware.com/kb/2055559 update-from-esxi5.0-5.0_update03 contains ESXi500-201310101-SG ESXi 4.1 ------------------ File: ESXi410-201312001.zip md5sum: f85c0c449513b88b22f19a5f11966d5e sha1sum: cfde5abbef77976b76d55813ae1e7bbbbca25b7b http://kb.vmware.com/kb/2061210 ESXi410-201312001 contains ESX410-201312401-SG ESXi 4.0 ------------------ File: ESXi400-201310001.zip md5sum: 3075bce1b19a52b053a5dc18d06d40e0 sha1sum: 19952da0dd9f81ea299cb8ae6c462f11566b56e0 http://kb.vmware.com/kb/2059496 ESXi400-201310001 contains ESXi400-201310401-SG ESX 4.1 ------------------ File: ESX410-201312001.zip md5sum: c35763a84db169dd0285442d4129cc18 sha1sum: ee8e1b8d2d383422ff0dde04749c5d89e77d8e40 http://kb.vmware.com/kb/2061209 ESX410-201312001 contains ESX410-201312401-SG ESX 4.0 ------------------ File: ESX400-201310001.zip md5sum: 9d47cf815ed142a17f97002379b5e386 sha1sum: 91082ec4263333f9b996883cb53dbe9aab7a88b5 http://kb.vmware.com/kb/2059495 ESX400-201310001contains ESX400-201310401-SG vCloud Director 5.1.x --------------------- https://www.vmware.com/go/download/vcloud-director 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1207 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1208 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1211 - - ----------------------------------------------------------------------- 6. Change log 2014-01-16 VMSA-2014-0001 Initial security advisory in conjunction with the release of vSphere 5.1 Update 2 and vCloud Director 5.1.3 on 2014-01-16 - - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2014 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFS2CeQDEcm8Vbi9kMRAuyMAJ9eCuV97LwvO10qrfRe1c1Bk/8r5gCg+DFT kBZkSb9II9ALA9cdRbdhi0g= =F0eg - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUtyLEBLndAQH1ShLAQKvSg/9H4u++f4gG0uwa6stAgFrxMQt6lKZIw+v kHFSaZxgMn249DByFXe9oSMa+eZQVlIksIQaIPQ/f+YmTQ6q3R10qZ/2JJHy0F+f qn8XI1gVGsYbJp3gZ6Wah4LN1OX8bqFqSIolZcH6njSqikZnWillZd0j0qlnYmTG kXxhkcVddBpvgq6sUlg2hGhAISdHkA4jZlAfsQq/nUxhVoCFOKbN5NPvRT9X5r3i px7dP/65WkzbswK/IBSW852x/MNahMOhUk4q5VJ4kl1TyZleU+9KZiCsWjKD2P+A 8927LHuvZ5bz6QufOS1fKHJJXaG0FMnIxc/13wLLTodNqTasNfxaPN72KcqOVb6s ocH4sr7Rth7+CbvXOz9GC28fy5PmQvcuJuOh3HsLXqNVx/AGAUThm4Suz/TBsp+U 5F85+QMBBvdj2zGL1pPI43gkIfYwor5HanEbLlin7BMOM3Kqybm8mSSPtQMRdyaZ wLo+gQiKrGGT/mxHHsdM2Kte2Stj4iGzbaFIubEjozvVV2ApCTCXrgCS4/ePrGRc MwMKr/sfi2VI9p4NvaJj8yxQ1ozSsi/dOi5VqxUaw08qDf9cJPvmKyXe76SgIQeB QcAZxVklAbi03imfLp18MTMaLwJe2oXSIadZgZS7SJWSo8Z4HcsIBEWmj1JpQD1H ujGj7rUDi8A= =fd26 -----END PGP SIGNATURE-----