Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.3076.2 vSphere Data Protection (VDP) updates address SSH Key-Based 7 June 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware vSphere Data Protection (VDP) Publisher: VMware Operating System: Virtualisation UNIX variants (UNIX, Linux, OSX) Impact/Access: Root Compromise -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-7456 Reference: ESB-2016.3076 Original Bulletin: http://www.vmware.com/security/advisories/VMSA-2016-0024.html Revision History: June 7 2017: Security advisory update in conjunction with the release of vSphere Data Protection 6.0.5 fixes. December 22 2016: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2016-0024.1 Severity: Critical Synopsis: vSphere Data Protection (VDP) updates address SSH Key-Based authentication issue Issue date: 2016-12-20 Updated on: 2017-06-06 CVE number: CVE-2016-7456 1. Summary vSphere Data Protection (VDP) updates address SSH key-based authentication issue 2. Relevant Products vSphere Data Protection (VDP) 3. Problem Description a. VDP SSH key-based authentication issue VDP contains a private SSH key with a known password that is configured to allow key-based authentication. Exploitation of this issue may allow an unauthorized remote attacker to log into the appliance with root privileges. VMware would like to thank Marc Ströbel aka phroxvs from HvS-Consulting for reporting this issue to VMware. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7456 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Critical 6.1.4 KB2147069 VDP 6.0.x VA Critical 6.0.5 KB2147069 VDP 5.8.x VA Critical KB2147069 None VDP 5.5.x VA Critical KB2147069 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Data Protection 6.1.4 Downloads and Documentation: https://my.vmware.com/group/vmware/details?productId=491&downloadGroup=VDP6 14 https://www.vmware.com/support/pubs/vdr_pubs.html vSphere Data Protection 6.0.5 Downloads and Documentation: https://my.vmware.com/group/vmware/details?productId=491&downloadGroup=VDP6 0_5 https://www.vmware.com/support/pubs/vdr_pubs.html vSphere Data Protection 5.8.x & 5.5.x Downloads and Documentation: http://kb.vmware.com/kb/2147069 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7456 - - --------------------------------------------------------------------------- 6. Change log 2016-12-20: VMSA-2016-0024 Initial security advisory in conjunction with the release of vSphere Data Protection updates on 2016-12-20. 2017-06-06: VMSA-2016-0024.1 Security advisory update in conjunction with the release of vSphere Data Protection 6.0.5 fixes. - - --------------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2017 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFZNtgQDEcm8Vbi9kMRAmfRAKCoH9IVFbiIA4q9SBYflMVLM971DgCgpy/K fxIVTZmNoj5FtfNJuoLwUf4= =9BHr - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWTd9mIx+lLeg9Ub1AQirng//R2n/1O10dY/AKSGinS8bQ/ohnbwORyPd MqZy97iosniVTSEjNLunAEH5/Kg8FHyzRzWYJQtEzAoCasPjV5rdwDyo3GImJOKl M10hCqfUP3kPyijnJxWDVpRPwrMTD3DolkKwARxO1gaNGyKtx5TDZKvYoCymNQy2 ohrqiRE0Gzuja11DdNadlEpjpDtZWZoftgQp5J++p74aRdF2jtOQEpTYhC8rYCtv skX2iBMd8Uq8FUNzCWAErXR3GAGMXt83tE9eHihHRZInC7C5VgmZmD43irBly3Py xoMDAavu0cQ8AErjTyqbqOTvV7j1etVu7mPdSHxUmPtkblzrIXoD1HYdMgUQOzPl hIQxN1rAXmbTE1J34+rot4F/yx26IC+SVhjQetT5Pwfbku48cSJBX9jmQ+F3+Tbi +Cd8Pef6ccjr2Wh+sUPw30H9Zm88dT5Ljnq/oBWb++/S0m8j1UBdbLIwrTIvIaE0 WGqgwX530jA/TwaYo0QE8sr2dOCWKFbnxwKRw/gMMsWGXeNyuK6yvSntLoeYVN2W SobJrWM8wPgjuGuuPDHx8rl2T6ELWQsB+lxaQ6UXz7Luk8PgVGBWij9zcUAWDO+I GJEcidZyU70OkbbAKHqvjmfWijH4Yxm7lKOKjcZ8REu7n48pS9cTfneBAIQWdLWs evcXiWxmZeE= =mB19 -----END PGP SIGNATURE-----