-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2016.3076.2
        vSphere Data Protection (VDP) updates address SSH Key-Based
                                7 June 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware vSphere Data Protection (VDP)
Publisher:         VMware
Operating System:  Virtualisation
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Root Compromise -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-7456  

Reference:         ESB-2016.3076

Original Bulletin: 
   http://www.vmware.com/security/advisories/VMSA-2016-0024.html

Revision History:  June      7 2017: Security advisory update in conjunction with the release of vSphere Data Protection 6.0.5 fixes.
                   December 22 2016: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------------
                        VMware Security Advisory

Advisory ID: VMSA-2016-0024.1
Severity:    Critical
Synopsis:    vSphere Data Protection (VDP) updates address SSH Key-Based
             authentication issue
Issue date:  2016-12-20
Updated on:  2017-06-06
CVE number:  CVE-2016-7456

1. Summary

   vSphere Data Protection (VDP) updates address SSH key-based
   authentication issue

2. Relevant Products

   vSphere Data Protection (VDP)

3. Problem Description

   a. VDP SSH key-based authentication issue

   VDP contains a private SSH key with a known password that is configured
   to allow key-based authentication. Exploitation of this issue may allow
   an unauthorized remote attacker to log into the appliance with root
   privileges.

   VMware would like to thank Marc Ströbel aka phroxvs from HvS-Consulting
   for reporting this issue to VMware.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2016-7456 to this issue.

   Column 5 of the following table lists the action required to remediate
   the vulnerability in each release, if a solution is available.

   VMware      Product    Running            Replace with/     Mitigation/
   Product     Version    on       Severity  Apply Patch       Workaround
   ==========  =========  =======  ========  ================  ==========
   VDP         6.1.x      VA       Critical  6.1.4             KB2147069
   VDP         6.0.x      VA       Critical  6.0.5             KB2147069
   VDP         5.8.x      VA       Critical  KB2147069         None
   VDP         5.5.x      VA       Critical  KB2147069         None

4. Solution

   Please review the patch/release notes for your product and version and
   verify the checksum of your downloaded file.

   vSphere Data Protection 6.1.4
   Downloads and Documentation:

https://my.vmware.com/group/vmware/details?productId=491&downloadGroup=VDP6
14
   https://www.vmware.com/support/pubs/vdr_pubs.html

   vSphere Data Protection 6.0.5
   Downloads and Documentation:

https://my.vmware.com/group/vmware/details?productId=491&downloadGroup=VDP6
0_5
   https://www.vmware.com/support/pubs/vdr_pubs.html

   vSphere Data Protection 5.8.x & 5.5.x
   Downloads and Documentation:
   http://kb.vmware.com/kb/2147069

5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7456

- - ---------------------------------------------------------------------------

6. Change log

   2016-12-20: VMSA-2016-0024
   Initial security advisory in conjunction with the release of vSphere
   Data Protection updates on 2016-12-20.

   2017-06-06: VMSA-2016-0024.1
   Security advisory update in conjunction with the release of vSphere Data
   Protection 6.0.5 fixes.

- - ---------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce@lists.vmware.com
    bugtraq@securityfocus.com
    fulldisclosure@seclists.org

   E-mail: security at vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2017 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFZNtgQDEcm8Vbi9kMRAmfRAKCoH9IVFbiIA4q9SBYflMVLM971DgCgpy/K
fxIVTZmNoj5FtfNJuoLwUf4=
=9BHr
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mB19
-----END PGP SIGNATURE-----