-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0493
      VMware vSphere Client updates address security vulnerabilities
                               11 April 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          VMWare vSphere Client
Publisher:        VMWare
Operating System: Windows
Impact/Access:    Execute Arbitrary Code/Commands -- Remote with User Interaction
                  Provide Misleading Information  -- Remote with User Interaction
Resolution:       Patch/Upgrade
CVE Names:        CVE-2014-1210 CVE-2014-1209 

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -----------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2014-0003
Synopsis:    VMware vSphere Client updates address security vulnerabilities
Issue date:  2014-04-10
Updated on:  2014-04-10 (initial advisory)
CVE numbers: CVE-2014-1209, CVE-2014-1210
- - -----------------------------------------------------------------------

1. Summary

   VMware vSphere Client updates address security vulnerabilities

2. Relevant releases

   vSphere Client 5.1
   vSphere Client 5.0
   vSphere Client 4.1
   vSphere Client 4.0
    
3. Problem Description

   a. vSphere Client Insecure Client Download

      vSphere Client contains a vulnerability in accepting an updated 
      vSphere Client file from an untrusted source. The vulnerability may 
      allow a host to direct vSphere Client to download and execute an 
      arbitrary file from any URI. This issue can be exploited if 
      the host has been compromised or if a user has been tricked 
      into clicking a malicious link.

      VMware would like to thank Recurity Labs GmbH and the Bundesamt
Sicherheit
      in der Informationstechnik (BSI) for reporting this issue to us

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has
      assigned the name CVE-2014-1209 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

        VMware            Product     Running     Replace with/
        Product           Version     on          Apply Patch 
        ==============    =======     =======     =================
        vSphere Client    5.5         Windows     not affected
        vSphere Client    5.1         Windows     5.1 Update 2 
        vSphere Client    5.0         Windows     5.0 Update 3 
        vSphere Client    4.1         Windows     vSphere Client 4.1 from 
                                                  ESX/EXSi 4.1 (see section
4)
        vSphere Client    4.0         Windows     vSphere Client 4.0 from 
                                                  ESX/EXSi 4.0 (see section
4)
      Known Issue

      Under certain circumstances a user may see a warning dialogue box 
      appear prior to downloading the vSphere Client. The warning dialogue 
      box may appear when connecting to a different vCenter Server version
that 
      the vSphere Client was intended for. This issue is documented in 
      VMware Knowledge Base article 2074148. 

   b. VMware vSphere Client spoofing vulnerability

      VMware vSphere Client contains a vulnerability in the validation 
      of the server security certificate. Exploitation of the issue may
      lead to vCenter server being spoofed. A user would have to be tricked
      into clicking a malicious link.
      
      VMware would like to thank Recurity Labs GmbH and the Bundesamt
Sicherheit
      in der Informationstechnik (BSI) for reporting this issue to us

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has
      assigned the name CVE-2014-1210 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

        VMware            Product     Running     Replace with/
        Product           Version     on          Apply Patch
        ==============    =======     =======     =================
        vSphere Client    5.5         Windows     not affected
        vSphere Client    5.1         Windows     5.1 Update 2 
        vSphere Client    5.0         Windows     5.0 Update 3 
        vSphere Client    4.1         Windows     not affected
        vSphere Client    4.0         Windows     not affected
      
      Known Issue

      Under certain circumstances a user may see a warning dialogue box 
      appear prior to downloading the vSphere Client. The warning dialogue 
      box may appear when connecting to a different vCenter Server version
that 
      the vSphere Client was intended for. This issue is documented in 
      VMware Knowledge Base article 2074148. 

4. Solution

   Please review the patch/release notes for your product and version
   and verify the checksum of your downloaded file. 

   vSphere Client 5.1 Update 2
   ---------------------------     
   vSphere Client 5.1 Update 2 may be obtained by pointing to 
   vCenter Server 5.1 Update 2. vCenter Server 5.1 Update 2 
   links provided below.

   vSphere Client 5.0 Update 3
   ---------------------------     
   vSphere Client 5.0 Update 3 may be obtained by pointing to 
   vCenter Server 5.0 Update 3. vCenter Server 5.0 Update 3 
   links provided below.

   vSphere Client 4.0 and 4.1
   ---------------------------     
   vSphere Client 4.0 and 4.1 may be obtained by pointing to ESX/ESXi 4.0
and 4.1
   after installing the following patches:
           
    ESXi 4.1 patch ESXi410-201404401-SG
    ESXi 4.0 patch ESXi400-201404402-SG
    
    ESX 4.1 patch ESX410-201404401-SG
    ESX 4.0 patch ESX400-201404401-SG

   Alternatively vSphere Client may be downloaded from
   https://my.vmware.com/web/vmware/downloads directly.

   vCenter Server 5.1 U2
   --------------------------- 
   Download link: 
  
https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_
vsphere/5_1 

   vCenter Server 5.0 U3
   --------------------------- 
   Download link: 
  
https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_
vsphere/5_0 

   ESXi and ESX 
   ------------ 
   https://my.vmware.com/web/vmware/downloads 
 
   ESXi 4.1 
   -------- 
   File: ESXi410-201404001.zip
   md5sum: bc4a5963fd9aace6b43e8c96f66a0536 
   sha1sum: f80a7a33f7d5e5cd22a7d2cbd65b0cc056cff745 
   http://kb.vmware.com/kb/2072477
   ESXi410-201403001.zip contains ESXi410-201404401-SG

   ESXi 4.0 
   -------- 
   File: ESXi400-201404001.zip
   md5sum: c10a17635fa4a5ffa4971d0437494488
   sha1sum: e2f5bc165aef118257d498ff1a9ecba74b2c648e
   http://kb.vmware.com/kb/2068805
   ESXi400-201404001.zip contains ESXi400-201402402-SG
   
   ESX 4.1 
   ------- 
   File: ESX410-201404001.zip
   md5sum: 320ce06e2ef68def3ba278b87c0f3104
   sha1sum: 5db78957208902b922a29976296cc5d948dbc1d7
   http://kb.vmware.com/kb/2072476
   ESX410-201404001.zip contains ESX410-201404401-SG

   ESX 4.0 
   ------- 
   File: ESX400-201404001.zip
   md5sum: a1f984a3d224dc35bdb450530167476f 
   sha1sum: 14a1612d99998df3fa5ef88956ac730de7d594fe 
   http://kb.vmware.com/kb/2068798
   ESX400-201404001.zip contains ESX400-201404401-SG

5. References

      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1209
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1210

      VMware Knowledge Base article 2074148. 
      http://kb.vmware.com/kb/2074148 

- - -----------------------------------------------------------------------

6. Change log

      2014-04-10 VMSA-2014-0003
      Initial security advisory in conjunction with the release of
      vSphere Client 4.0 and 4.1 updates on 2014-04-10

- - -----------------------------------------------------------------------

7. Contact

      E-mail list for product security notifications and announcements:
      http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

      This Security Advisory is posted to the following lists:

      * security-announce at lists.vmware.com
      * bugtraq at securityfocus.com
      * fulldisclosure at seclists.org

      E-mail: security at vmware.com
      PGP key at: http://kb.vmware.com/kb/1055

      VMware Security Advisories
      http://www.vmware.com/security/advisories

      VMware security response policy
      http://www.vmware.com/support/policies/security_response.html

      General support life cycle policy
      https://www.vmware.com/support/policies/general.html

      Twitter
      https://twitter.com/VMwareSRC

      Copyright 2014 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFTR2nZDEcm8Vbi9kMRAgYLAKD1wg6koYFUD1IzOTMCru44v/56mwCeKSn8
MetTkcuvjrGfFH5RFb9q9qU=
=Pm8V
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EoIW
-----END PGP SIGNATURE-----