NEW VMSA-2015-0006 – VMware vCenter Server updates address a LDAP certificate validation issue

------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2015-0006
Synopsis:    VMware vCenter Server updates address a LDAP certificate
             validation issue

Issue date:  2015-09-16
Updated on:  2015-09-16
CVE number:  CVE-2015-6932
------------------------------------------------------------------------

1. Summary

   VMware vCenter Server updates address a LDAP certificate validation
   issue.


2. Relevant Releases

   VMware vCenter Server prior to version 6.0 update 1
   VMware vCenter Server prior to version 5.5 update 3


3. Problem Description

    VMware vCenter Server LDAP certificate validation vulnerability

    VMware vCenter Server does not validate the certificate when binding
    to an LDAP server using TLS. Exploitation of this vulnerability may
    allow an attacker that is able to intercept traffic between vCenter
    Server and the LDAP server to capture sensitive information.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the identifier CVE-2015-6932 to this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

      VMware                        Product    Running   Replace with/
      Product                       Version    on        Apply Patch
      =============                 =======    =======   ===============
      VMware vCenter Server         6.0        Any       6.0 u1
      VMware vCenter Server         5.5        Any       5.5 u3
      VMware vCenter Server         5.1        Any       not affected
      VMware vCenter Server         5.0        Any       not affected


4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   vCenter Server
   --------------------------------
   Downloads and Documentation:
   https://www.vmware.com/go/download-vsphere



5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6932

------------------------------------------------------------------------

6. Change log

   2015-09-16 VMSA-2015-0006
   Initial security advisory.


------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2015 VMware Inc.  All rights reserved.
_______________________________________________
Security-announce mailing list
Security-announce-xEzmwC/hc7si8rCdYzckzA< at >public.gmane.org
http://lists.vmware.com/mailman/listinfo/security-announce

Scald – Moderately Critical – Information Disclosure – SA-CONTRIB-2015-151

Description

This module enables you to easily manage your media assets and re-use them in all your content.

The module provided a “debug” context that gave access to all the atom properties, including all the fields attached to this atom, without applying the corresponding field restrictions.

This vulnerability is mitigated by the fact that only sites that added fields to an atom type and then restricted access to those fields are vulnerable.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • Scald 7.x-1.x versions prior to 7.x-1.5.

Drupal core is not affected. If you do not use the contributed Scald: Media Management made easy module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Scald module for Drupal 7.x, upgrade to Scald 7.x-1.5

Also see the Scald: Media Management made easy project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

CMS Updater – Moderately Critical – Multiple vulnerabilities – SA-CONTRIB-2015-150

Description

CMS Updater allows to update Drupal core automatically with a subscription service.

Access bypass
The module does not sufficiently protect the settings page allowing any user with the permission “access administration pages” to change settings.

This vulnerability is mitigated by the fact that an attacker must have the “access administration pages” permission on the site.

Cross Site Scripting (XSS)
The module does not sanitize user provided text on the configuration page thereby exposing a cross site scripting vulnerability.

There are no mitigating factors for the cross site scripting.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • CMS Updater 7.x-1.x versions prior to 7.x-1.3.

Drupal core is not affected. If you do not use the contributed CMS Updater module, there is nothing you need to do.

Solution

Install the latest version:

Also see the CMS Updater project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

Scan of IPv4 Space for ‘Implanted’ Cisco Routers Finds Fewer Than 100

A day after researchers detailed a technique that attackers are using to upload malicious firmware images to Cisco routers, academic researchers say they have scanned the entire IPv4 address space and discovered a total of 79 likely compromised routers. The researchers at the University of Michigan used their Zmap tool, which can scan the Internet in about […]

CVE-2015-5440

HP UCMDB 10.00 and 10.01 before 10.01CUP12, 10.10 and 10.11 before 10.11CUP6, and 10.2x before 10.21 allows local users to obtain sensitive information via unspecified vectors.