Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0493 VMware vSphere Client updates address security vulnerabilities 11 April 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMWare vSphere Client Publisher: VMWare Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-1210 CVE-2014-1209 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ----------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2014-0003 Synopsis: VMware vSphere Client updates address security vulnerabilities Issue date: 2014-04-10 Updated on: 2014-04-10 (initial advisory) CVE numbers: CVE-2014-1209, CVE-2014-1210 - - ----------------------------------------------------------------------- 1. Summary VMware vSphere Client updates address security vulnerabilities 2. Relevant releases vSphere Client 5.1 vSphere Client 5.0 vSphere Client 4.1 vSphere Client 4.0 3. Problem Description a. vSphere Client Insecure Client Download vSphere Client contains a vulnerability in accepting an updated vSphere Client file from an untrusted source. The vulnerability may allow a host to direct vSphere Client to download and execute an arbitrary file from any URI. This issue can be exploited if the host has been compromised or if a user has been tricked into clicking a malicious link. VMware would like to thank Recurity Labs GmbH and the Bundesamt Sicherheit in der Informationstechnik (BSI) for reporting this issue to us The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1209 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================= vSphere Client 5.5 Windows not affected vSphere Client 5.1 Windows 5.1 Update 2 vSphere Client 5.0 Windows 5.0 Update 3 vSphere Client 4.1 Windows vSphere Client 4.1 from ESX/EXSi 4.1 (see section 4) vSphere Client 4.0 Windows vSphere Client 4.0 from ESX/EXSi 4.0 (see section 4) Known Issue Under certain circumstances a user may see a warning dialogue box appear prior to downloading the vSphere Client. The warning dialogue box may appear when connecting to a different vCenter Server version that the vSphere Client was intended for. This issue is documented in VMware Knowledge Base article 2074148. b. VMware vSphere Client spoofing vulnerability VMware vSphere Client contains a vulnerability in the validation of the server security certificate. Exploitation of the issue may lead to vCenter server being spoofed. A user would have to be tricked into clicking a malicious link. VMware would like to thank Recurity Labs GmbH and the Bundesamt Sicherheit in der Informationstechnik (BSI) for reporting this issue to us The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1210 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================= vSphere Client 5.5 Windows not affected vSphere Client 5.1 Windows 5.1 Update 2 vSphere Client 5.0 Windows 5.0 Update 3 vSphere Client 4.1 Windows not affected vSphere Client 4.0 Windows not affected Known Issue Under certain circumstances a user may see a warning dialogue box appear prior to downloading the vSphere Client. The warning dialogue box may appear when connecting to a different vCenter Server version that the vSphere Client was intended for. This issue is documented in VMware Knowledge Base article 2074148. 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Client 5.1 Update 2 --------------------------- vSphere Client 5.1 Update 2 may be obtained by pointing to vCenter Server 5.1 Update 2. vCenter Server 5.1 Update 2 links provided below. vSphere Client 5.0 Update 3 --------------------------- vSphere Client 5.0 Update 3 may be obtained by pointing to vCenter Server 5.0 Update 3. vCenter Server 5.0 Update 3 links provided below. vSphere Client 4.0 and 4.1 --------------------------- vSphere Client 4.0 and 4.1 may be obtained by pointing to ESX/ESXi 4.0 and 4.1 after installing the following patches: ESXi 4.1 patch ESXi410-201404401-SG ESXi 4.0 patch ESXi400-201404402-SG ESX 4.1 patch ESX410-201404401-SG ESX 4.0 patch ESX400-201404401-SG Alternatively vSphere Client may be downloaded from https://my.vmware.com/web/vmware/downloads directly. vCenter Server 5.1 U2 --------------------------- Download link: https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_ vsphere/5_1 vCenter Server 5.0 U3 --------------------------- Download link: https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_ vsphere/5_0 ESXi and ESX ------------ https://my.vmware.com/web/vmware/downloads ESXi 4.1 -------- File: ESXi410-201404001.zip md5sum: bc4a5963fd9aace6b43e8c96f66a0536 sha1sum: f80a7a33f7d5e5cd22a7d2cbd65b0cc056cff745 http://kb.vmware.com/kb/2072477 ESXi410-201403001.zip contains ESXi410-201404401-SG ESXi 4.0 -------- File: ESXi400-201404001.zip md5sum: c10a17635fa4a5ffa4971d0437494488 sha1sum: e2f5bc165aef118257d498ff1a9ecba74b2c648e http://kb.vmware.com/kb/2068805 ESXi400-201404001.zip contains ESXi400-201402402-SG ESX 4.1 ------- File: ESX410-201404001.zip md5sum: 320ce06e2ef68def3ba278b87c0f3104 sha1sum: 5db78957208902b922a29976296cc5d948dbc1d7 http://kb.vmware.com/kb/2072476 ESX410-201404001.zip contains ESX410-201404401-SG ESX 4.0 ------- File: ESX400-201404001.zip md5sum: a1f984a3d224dc35bdb450530167476f sha1sum: 14a1612d99998df3fa5ef88956ac730de7d594fe http://kb.vmware.com/kb/2068798 ESX400-201404001.zip contains ESX400-201404401-SG 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1210 VMware Knowledge Base article 2074148. http://kb.vmware.com/kb/2074148 - - ----------------------------------------------------------------------- 6. Change log 2014-04-10 VMSA-2014-0003 Initial security advisory in conjunction with the release of vSphere Client 4.0 and 4.1 updates on 2014-04-10 - - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy https://www.vmware.com/support/policies/general.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFTR2nZDEcm8Vbi9kMRAgYLAKD1wg6koYFUD1IzOTMCru44v/56mwCeKSn8 MetTkcuvjrGfFH5RFb9q9qU= =Pm8V - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU0eJvhLndAQH1ShLAQJ9yQ/9EW3CiL48/unJhlPUx4AJinQ0pKgb+KaG XWe1M5I7MgNyYFruKNtlmDZ8ATiKeDbsZKyLNNRBrAvLR24hxgOr2ifIaFgf2pqU +7+dJ2QxJ9UkXnfLLunIqh33kIvLIZoT60yuEJr4GRic23CPntqV2+vFiJx2VKjv M7AlQBJx5gEf3OG7d1uHnKKyOKwtOgwyA7Jrh5hEktTxIkHMs/0Fp4/Oq3DC5R3W vp99eBkaLEp8EmdttW0/bK9Wv1w9I4Umqqc85xw8CS6Q09uhIHtP1YALRVrjZ+Tk mJrzeS1F74d9EKz6bLYKlD4pWRTh8B8Cxz3P9WCJPP3QkiXB/UeC2RhlTRhvHcJa 3uVrGuRPV9WjyqwGq5ZdV9CPNCI1Dp9x516iIA7Cna7qSl7bs07RBDslkUf8Pbo4 Pzzj5mV5PvKnvkLc5ThH5hKqz1IK0WqDfm4aut74H9bfA6I4veInBQKvUAQ2lJ+v 0fnO1Cg1Vtl+2DbndNoXBl10zDTWI8UI79a5XYIO32uYURlLppRBamBiaG2VBUim eP6EE5AsV2Tw27bRfHavsc947VVqh/JFo6gTm/E4Ml4MMJi2ZI9xt6JHkeQTUMBY 8Ix6MhInUddMmRioK6fx0jF38FNse0RndZN71tAgf4jcoKU3sojmov/BQwA4XjcQ dTe2NonFhvI= =EoIW -----END PGP SIGNATURE-----