Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.1033.3 VMware product updates address security vulnerabilities in Apache Struts library 11 September 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware vCenter Operations Management Suite VMWare vCenter Orchestrator Publisher: VMware Operating System: Windows Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-0112 CVE-2014-0094 CVE-2014-0050 Reference: ASB-2014.0077 ESB-2014.1103 Revision History: September 11 2014: Updated security advisory in conjunction with the release of vCenter Orchestrator 5.5.2 on 2014-09-09. July 14 2014: Updated security advisory in conjunction with the release of vCenter Operations Management Suite 5.7.3 on 2014-07-10 June 25 2014: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2014-0007.2 Synopsis: VMware product updates address security vulnerabilities in Apache Struts library Issue date: 2014-06-24 Updated on: 2014-09-09 CVE number: CVE-2014-0050, CVE-2014-0094, CVE-2014-0112 - - ------------------------------------------------------------------------ 1. Summary VMware product updates address security vulnerabilities in Apache Struts library 2. Relevant releases VMware vCenter Operations Management Suite prior to 5.8.2 VMware vCenter Operations Management Suite prior to 5.7.3 VMware vCenter Orchestrator prior to 5.5.2 3. Problem Description a. The Apache Struts library is updated to version 2.3.16.2 to address multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2014-0050, CVE-2014-0094, and CVE-2014-0112 to these issues. CVE-2014-0112 may lead to remote code execution. This issue was found to be only partially addressed in CVE-2014-0094. CVE-2014-0050 may lead to a denial of service condition. vCenter Operations Management Suite (vCOps) is affected by both CVE-2014-0112 and CVE-2014-0050. Exploitation of CVE-2014-0112 may lead to remote code execution without authentication. vCenter Orchestrator (vCO) is affected by CVE-2014-0050 and not by CVE-2014-0112. Workaround A workaround for CVE-2014-0112 is documented in VMware Knowledge Base article 2081470. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ========== ======= ======= ================= vCOPS 5.8.x any vCOPS 5.8.2 vCOPS 5.7.x any vCOPS 5.7.3 vCO 5.5 any vCO 5.5.2 vCO 5.1 any patch pending vCO 4.2 any patch pending 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vCenter Operations Management Suite 5.8.2 and 5.7.3 --------------------------------------------------- Downloads and Documentation: https://www.vmware.com/go/download-vcops vCenter Orchestrator 5.5.2 -------------------------- Downloads and Documentation: https://www.vmware.com/go/download-vsphere 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0112 http://kb.vmware.com/kb/2081470 - - ------------------------------------------------------------------------ 6. Change log 2014-06-24 VMSA-2014-0007 Initial security advisory in conjunction with the release of vCenter Operations Management Suite 5.8.2 on 2014-06-24. 2014-07-11 VMSA-2014-0007.1 Updated security advisory in conjunction with the release of vCenter Operations Management Suite 5.7.3 on 2014-07-10. 2014-09-09 VMSA-2014-0007.2 Updated security advisory in conjunction with the release of vCenter Orchestrator 5.5.2 on 2014-09-09. - - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFUD2OBDEcm8Vbi9kMRAvS6AKDqvOoAKkUoghqYONuEBm98u8/ZoACg1/s3 Sxk/o2UW00LIgdOXpUKB9D4= =nRjh - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVBD5whLndAQH1ShLAQK0mRAAsD4G4reG7sd0GRc2W4qdCIsYFGtxB9Po SyTel5VWO2YPSng9r4ldJHUEdEyKpGBaexsMq7Izwq7bNY7R+FO1zKFQ1c5FdaIe xHh+hBT18dZxAZS0LrEM0VqWw3G+be6x3vbbjml0RCMukV4kOdgcIbxdkSzPadsZ +xjwUlsAUYMvrrL/AI+e7igupxwzb8LmolR4mc026PlrPO3EIu2HZyMq7vzFSS6x m1EZCPOC++6naqJq2Hwme+5ZuuLmC+RywOXiRQ05bJmyjcCyFGaFr+W+wUkkl+GQ jRy1/2C0hoazRavEacczsd53B80FlJUNXypQjxq7SvygzKCkHJC3ZGyNrjuz0lQV RuxqXC8FmWmTNV5D7mcOi1KkIGNbWrWvA9O10w+48PMJsCxvDqpgJGZMtDWRZZd5 tnEkOK2vHuIsz/bTvvWm35MpmybXx6Waq8HPoifBBaTjB2D2RM3Qud+tFZ2xnGTm DWIyi45YwT44u+x99mTe9BqWjo1gWSDoY4mjIhiTaPt15lkw0JR3bFcdKTeF/JQn GeKHvuddHyqMmc8IsFCUq2xORl5e10yOt3tonBTtKzxKi0B69hp6BVnBiFkyzJnr bNtOpqH33x/0KzN/bcwJk8p9v0nl4/7LhFZIer0VLEvgQkGEbw9JN9h9kzpSDqPc 5jFhxpHSvF0= =922W -----END PGP SIGNATURE-----