-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010.3 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-10-02 CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) ESX 4.1 without patch ESX410-201410401-SG ESX 4.0 without patch ESX400-201410401-SG vCenter Server Appliance prior to 5.5 U2a vCenter Server Appliance prior to 5.1 U2b vCenter Server Appliance prior to 5.0 U3b Horizon Workspace 1.x, 2.x without patch IT Business Management Suite prior to 1.1.0 IT Business Management Suite prior to 1.0.1 vCenter Hyperic Server prior to 5.8.3 vCenter Hyperic Server prior to 5.7.2 vCenter Hyperic Server prior to 5.0.3 vCenter Infrastructure Navigator prior to 5.8.3 vCenter Infrastructure Navigator prior to 5.7.1 vCenter Infrastructure Navigator prior to 2.0.1 vCenter Log Insight prior to 2.0U1 vCenter Operations Manager 5.x without patch vCenter Orchestrator Appliance 5.x, 4.x without patch vCenter Site Recovery Manager prior to 5.5.1.3 vCenter Site Recovery Manager prior to 5.1.2.2 vCenter Support Assistant without patch vCloud Application Director 5.x, 6.x without patch vCloud Automation Center 6.x without patch vCloud Automation Center Application Services 6.x without patch vCloud Director Appliance prior to 5.5.1.3 vFabric Postgres prior to 9.3.5.1 vFabric Postgres prior to 9.2.9.1 vFabric Postgres prior to 9.1.14.1 VMware Data Recovery prior to 2.0.4 VMware Mirage Gateway prior to 5.1.1 vSphere App HA prior to 1.1.1 vSphere Management Assistant 5.5.x without 5.5 EP1 vSphere Management Assistant 5.0.x without 5.0 EP1 vSphere Replication prior to 5.8.0.1 vSphere Replication prior to 5.5.1.3 vSphere Replication prior to 5.1.2.2 vSphere Storage Appliance prior to 5.5.2 vSphere Storage Appliance 5.1.x without patch 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX ESX410-201410401-SG* ESX 4.0 ESX ESX400-201410401-SG* * VMware has made VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================ vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b, 5.0 U3b Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux See Section 4 IT Business Management Suite 1.x Linux 1.1.0, 1.0.1 NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending** vCenter Hyperic Server 5.x Linux 5.8.3, 5.7.2, 5.0.3 vCenter Infrastructure Navigator 2.x, 5.x Linux 5.8.3, 5.7.1, 2.0.1 vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux See Section 4 vCenter Orchestrator Appliance 4.x, 5.x Linux See Section 4 vCenter Site Recovery Manager 5.x Linux 5.5.1.3, 5.1.2.2, 5.0.x** vCenter Support Assistant 5.x Linux See Section 4 vCloud Application Director 5.x, 6.x Linux See Section 4 vCloud Automation Center 6.x Linux See Section 4 vCloud Automation Center Application Services 6.x Linux See Section 4 vCloud Director Appliance 5.x Linux 5.5.1.3 vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Postgres 9.x Linux 9.3.5.1, 9.2.9.1, 9.1.14.1 Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux 2.0.4 VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux 5.1.1 VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux 1.1.1 vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux 5.5 EP1, 5.0 EP1 vSphere Replication 5.x Linux 5.8.0.1, 5.5.1.3, 5.1.2.2 vSphere Storage Appliance 5.x Linux 5.5.2, 5.1.3 See Section 4 ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution ESX --- Downloads: https://www.vmware.com/patchmgr/findPatch.portal Documentation: http://kb.vmware.com/kb/2090859 http://kb.vmware.com/kb/2090853 vCenter Server Appliance ------------------------ Downloads: https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2 (scroll down to 5.5 Update 2a Appliance) https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS P510-VC-51U2A (scroll down to 5.1 Update 2b Appliance) https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3 A (scroll down to 5.0 Update 3b Appliance) Documentation: http://kb.vmware.com/kb/2091085 http://kb.vmware.com/kb/2091018 http://kb.vmware.com/kb/2091017 Horizon Workspace ------------------------- Downloads: (Scroll down to the relevant download) Workspace Portal 2.1.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNP210 Workspace Portal 2.0.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNWS200 Horizon Workspace 1.8.2 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS182 Horizon Workspace 1.8.1 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS181 Horizon Workspace 1.8.0 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS180 Horizon Workspace 1.5.2 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS152 Horizon Workspace 1.5.1 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS151 Horizon Workspace 1.5.0 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS150 Documentation: http://kb.vmware.com/kb/2091067 IT Business Management Suite ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-110&product Id=384&rPId=6384 https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-101&product Id=385&rPId=6333 Documentation: http://kb.vmware.com/kb/2091014 http://kb.vmware.com/kb/2091013 vCenter Hyperic Server ---------------------- Downloads: https://my.vmware.com/group/vmware/get-download?downloadGroup=VCHQ_583_AGEN T https://my.vmware.com/group/vmware/get-download?downloadGroup=VCHQ_583_SERV ER https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_572_AGEN T https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_572 https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_503_AGEN T https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_503_SERV ER Documentation: http://kb.vmware.com/kb/2091109 http://kb.vmware.com/kb/2091206 http://kb.vmware.com/kb/2091207 vCenter Infrastructure Navigator -------------------------------- Downloads: https://my.vmware.com/group/vmware/get-download?downloadGroup=VIN_583 https://my.vmware.com/group/vmware/get-download?downloadGroup=VIN_571 https://my.vmware.com/group/vmware/get-download?downloadGroup=VIN_201 Documentation: http://kb.vmware.com/kb/2091095 http://kb.vmware.com/kb/2091093 http://kb.vmware.com/kb/2091108 vCenter Log Insight ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4 12&rPId=5804 Documentation: http://kb.vmware.com/kb/2091065 vCenter Operations Manager -------------------------- Downloads: https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-583-STD https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-573-STD Documentation: http://kb.vmware.com/kb/2091083 http://kb.vmware.com/kb/2091002 vCenter Orchestrator Appliance ------------------------------ Downloads and Documentation: http://kb.vmware.com/kb/2091036 vCenter Site Recovery Manager ----------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=SRM5513&productId=35 7&rPId=6636 https://my.vmware.com/web/vmware/details?downloadGroup=SRM5122&productId=29 1&rPId=6631 Documentation: http://kb.vmware.com/kb/2091038 http://kb.vmware.com/kb/2091039 http://kb.vmware.com/kb/2091037 (5.0.x) vCenter Support Assistant ------------------------- Downloads and Documentation: http://kb.vmware.com/kb/2091112 vCloud Application Director --------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPDIR_601_GA&produc tId=383&rPId=6216 https://my.vmware.com/web/vmware/details?downloadGroup=VFAPPDIR_520_GA&prod uctId=345&rPId=3789 Documentation: http://kb.vmware.com/kb/2091129 vCloud Automation Center ------------------------ Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-610&productId=4 47&rPId=6501 https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-6012&productId= 383&rPId=6216 Documentation: http://kb.vmware.com/kb/2091012 vCloud Automation Center Application Services --------------------------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPSER_610&productId =447&rPId=6501 Documentation: http://kb.vmware.com/kb/2091129 vCloud Director Appliance ------------------------- Downloads: www.vmware.com/go/try-vcloud-director Documentation: http://kb.vmware.com/kb/2091071 vFabric Postgres ---------------- Downloads: https://my.vmware.com/web/vmware/info/slug/application_platform/vmware_vfab ric_postgres/9_3 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_2 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_1 Documentation: http://kb.vmware.com/kb/2091055 VMware Data Recovery -------------------- Downloads: https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204 Documentation: http://kb.vmware.com/kb/2091015 VMware Mirage Gateway --------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId =407&rPId=6565 (See VMware Mirage Gateway Software) Documentation: http://kb.vmware.com/kb/2091090 vSphere App HA -------------- Downloads: https://my.vmware.com/group/vmware/get-download?downloadGroup=APPHA-111 Documentation: http://kb.vmware.com/kb/2091087 vSphere Management Assistant ---------------------------- Downloads: Download available via online vMA update mechanism Documentation: http://kb.vmware.com/kb/2079150 http://kb.vmware.com/kb/2079151 vSphere Replication ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VR5801&productId=353 &rPId=6654 https://my.vmware.com/web/vmware/details?productId=353&rPId=5721&downloadGr oup=VR5513 https://my.vmware.com/web/vmware/details?downloadGroup=VR5122&productId=285 &rPId=6779 Documentation: http://kb.vmware.com/kb/2091019 http://kb.vmware.com/kb/2091033 http://kb.vmware.com/kb/2091035 vSphere Storage Appliance ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc tId=354&rPId=6585 https://my.vmware.com/web/vmware/details?downloadGroup=VSP51-VSA-513&produc tId=297&rPId=3752 Documentation: http://kb.vmware.com/kb/2091000 http://kb.vmware.com/kb/2091086 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. 2014-10-01 VMSA-2014-0010.1 Updated advisory in conjunction with the release of ESX 4.x patches, vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added CVE-2014-6277 and CVE-2014-6278 as they have been confirmed to be mitigated. 2014-10-01 VMSA-2014-0010.2 Updated advisory in conjunction with the release of Horizon Workspace patches, IT Business Management Suite 1.1.0 and 1.0.1, vCenter Operations Manager patches, vCenter Site Recovery Manager 5.5.1.3 and 5.1.2.2, vCloud Application Director patches, vCloud Automation Center patches, vCloud Automation Center Application Services patches, vCloud Director Appliance 5.5.1.3, vFabric Postgres 9.3.5.1, 9.2.9.1, and 9.1.14.1, vSphere Replication 5.8.0.1, 5.5.1.3, and 5.1.2.2 on 2014-10-01. 2014-10-02 VMSA-2014-0010.3 Updated advisory in conjunction with the release of vCenter Hyperic Server 5.8.3, 5.7.2, and 5.0.3, vCenter Infrastructure Navigator 5.8.3, 5.7.1, and 2.0.1 vCenter Orchestrator Appliance patches, vCenter Support Assistant patches, vSphere App HA 1.1.1, vSphere Management Assistant 5.5 EP1 and 5.0 EP1 and vSphere Storage Appliance patches on 2014-10-02 - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFULZh6DEcm8Vbi9kMRAtJuAJoCepB6VTQBT4ccSzyB/e5V/POFTACeLIZq L8DyxvSy6zG5yCwxFsx4uSg= =q++D -----END PGP SIGNATURE-----
Category Archives: VMWare
VMWare
UPDATED VMSA-2014-0010.3 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010.3 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-10-02 CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) ESX 4.1 without patch ESX410-201410401-SG ESX 4.0 without patch ESX400-201410401-SG vCenter Server Appliance prior to 5.5 U2a vCenter Server Appliance prior to 5.1 U2b vCenter Server Appliance prior to 5.0 U3b Horizon Workspace 1.x, 2.x without patch IT Business Management Suite prior to 1.1.0 IT Business Management Suite prior to 1.0.1 vCenter Hyperic Server prior to 5.8.3 vCenter Hyperic Server prior to 5.7.2 vCenter Hyperic Server prior to 5.0.3 vCenter Infrastructure Navigator prior to 5.8.3 vCenter Infrastructure Navigator prior to 5.7.1 vCenter Infrastructure Navigator prior to 2.0.1 vCenter Log Insight prior to 2.0U1 vCenter Operations Manager 5.x without patch vCenter Orchestrator Appliance 5.x, 4.x without patch vCenter Site Recovery Manager prior to 5.5.1.3 vCenter Site Recovery Manager prior to 5.1.2.2 vCenter Support Assistant without patch vCloud Application Director 5.x, 6.x without patch vCloud Automation Center 6.x without patch vCloud Automation Center Application Services 6.x without patch vCloud Director Appliance prior to 5.5.1.3 vFabric Postgres prior to 9.3.5.1 vFabric Postgres prior to 9.2.9.1 vFabric Postgres prior to 9.1.14.1 VMware Data Recovery prior to 2.0.4 VMware Mirage Gateway prior to 5.1.1 vSphere App HA prior to 1.1.1 vSphere Management Assistant 5.5.x without 5.5 EP1 vSphere Management Assistant 5.0.x without 5.0 EP1 vSphere Replication prior to 5.8.0.1 vSphere Replication prior to 5.5.1.3 vSphere Replication prior to 5.1.2.2 vSphere Storage Appliance prior to 5.5.2 vSphere Storage Appliance 5.1.x without patch 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX ESX410-201410401-SG* ESX 4.0 ESX ESX400-201410401-SG* * VMware has made VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================ vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b, 5.0 U3b Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux See Section 4 IT Business Management Suite 1.x Linux 1.1.0, 1.0.1 NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending** vCenter Hyperic Server 5.x Linux 5.8.3, 5.7.2, 5.0.3 vCenter Infrastructure Navigator 2.x, 5.x Linux 5.8.3, 5.7.1, 2.0.1 vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux See Section 4 vCenter Orchestrator Appliance 4.x, 5.x Linux See Section 4 vCenter Site Recovery Manager 5.x Linux 5.5.1.3, 5.1.2.2, 5.0.x** vCenter Support Assistant 5.x Linux See Section 4 vCloud Application Director 5.x, 6.x Linux See Section 4 vCloud Automation Center 6.x Linux See Section 4 vCloud Automation Center Application Services 6.x Linux See Section 4 vCloud Director Appliance 5.x Linux 5.5.1.3 vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Postgres 9.x Linux 9.3.5.1, 9.2.9.1, 9.1.14.1 Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux 2.0.4 VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux 5.1.1 VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux 1.1.1 vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux 5.5 EP1, 5.0 EP1 vSphere Replication 5.x Linux 5.8.0.1, 5.5.1.3, 5.1.2.2 vSphere Storage Appliance 5.x Linux 5.5.2, 5.1.3 See Section 4 ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution ESX --- Downloads: https://www.vmware.com/patchmgr/findPatch.portal Documentation: http://kb.vmware.com/kb/2090859 http://kb.vmware.com/kb/2090853 vCenter Server Appliance ------------------------ Downloads: https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2 (scroll down to 5.5 Update 2a Appliance) https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS P510-VC-51U2A (scroll down to 5.1 Update 2b Appliance) https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3 A (scroll down to 5.0 Update 3b Appliance) Documentation: http://kb.vmware.com/kb/2091085 http://kb.vmware.com/kb/2091018 http://kb.vmware.com/kb/2091017 Horizon Workspace ------------------------- Downloads: (Scroll down to the relevant download) Workspace Portal 2.1.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNP210 Workspace Portal 2.0.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNWS200 Horizon Workspace 1.8.2 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS182 Horizon Workspace 1.8.1 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS181 Horizon Workspace 1.8.0 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS180 Horizon Workspace 1.5.2 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS152 Horizon Workspace 1.5.1 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS151 Horizon Workspace 1.5.0 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS150 Documentation: http://kb.vmware.com/kb/2091067 IT Business Management Suite ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-110&product Id=384&rPId=6384 https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-101&product Id=385&rPId=6333 Documentation: http://kb.vmware.com/kb/2091014 http://kb.vmware.com/kb/2091013 vCenter Hyperic Server ---------------------- Downloads: https://my.vmware.com/group/vmware/get-download?downloadGroup=VCHQ_583_AGEN T https://my.vmware.com/group/vmware/get-download?downloadGroup=VCHQ_583_SERV ER https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_572_AGEN T https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_572 https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_503_AGEN T https://my.vmware.com/group/vmware/get-download?downloadGroup=VFHQ_503_SERV ER Documentation: http://kb.vmware.com/kb/2091109 http://kb.vmware.com/kb/2091206 http://kb.vmware.com/kb/2091207 vCenter Infrastructure Navigator -------------------------------- Downloads: https://my.vmware.com/group/vmware/get-download?downloadGroup=VIN_583 https://my.vmware.com/group/vmware/get-download?downloadGroup=VIN_571 https://my.vmware.com/group/vmware/get-download?downloadGroup=VIN_201 Documentation: http://kb.vmware.com/kb/2091095 http://kb.vmware.com/kb/2091093 http://kb.vmware.com/kb/2091108 vCenter Log Insight ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4 12&rPId=5804 Documentation: http://kb.vmware.com/kb/2091065 vCenter Operations Manager -------------------------- Downloads: https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-583-STD https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-573-STD Documentation: http://kb.vmware.com/kb/2091083 http://kb.vmware.com/kb/2091002 vCenter Orchestrator Appliance ------------------------------ Downloads and Documentation: http://kb.vmware.com/kb/2091036 vCenter Site Recovery Manager ----------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=SRM5513&productId=35 7&rPId=6636 https://my.vmware.com/web/vmware/details?downloadGroup=SRM5122&productId=29 1&rPId=6631 Documentation: http://kb.vmware.com/kb/2091038 http://kb.vmware.com/kb/2091039 http://kb.vmware.com/kb/2091037 (5.0.x) vCenter Support Assistant ------------------------- Downloads and Documentation: http://kb.vmware.com/kb/2091112 vCloud Application Director --------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPDIR_601_GA&produc tId=383&rPId=6216 https://my.vmware.com/web/vmware/details?downloadGroup=VFAPPDIR_520_GA&prod uctId=345&rPId=3789 Documentation: http://kb.vmware.com/kb/2091129 vCloud Automation Center ------------------------ Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-610&productId=4 47&rPId=6501 https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-6012&productId= 383&rPId=6216 Documentation: http://kb.vmware.com/kb/2091012 vCloud Automation Center Application Services --------------------------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPSER_610&productId =447&rPId=6501 Documentation: http://kb.vmware.com/kb/2091129 vCloud Director Appliance ------------------------- Downloads: www.vmware.com/go/try-vcloud-director Documentation: http://kb.vmware.com/kb/2091071 vFabric Postgres ---------------- Downloads: https://my.vmware.com/web/vmware/info/slug/application_platform/vmware_vfab ric_postgres/9_3 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_2 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_1 Documentation: http://kb.vmware.com/kb/2091055 VMware Data Recovery -------------------- Downloads: https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204 Documentation: http://kb.vmware.com/kb/2091015 VMware Mirage Gateway --------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId =407&rPId=6565 (See VMware Mirage Gateway Software) Documentation: http://kb.vmware.com/kb/2091090 vSphere App HA -------------- Downloads: https://my.vmware.com/group/vmware/get-download?downloadGroup=APPHA-111 Documentation: http://kb.vmware.com/kb/2091087 vSphere Management Assistant ---------------------------- Downloads: Download available via online vMA update mechanism Documentation: http://kb.vmware.com/kb/2079150 http://kb.vmware.com/kb/2079151 vSphere Replication ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VR5801&productId=353 &rPId=6654 https://my.vmware.com/web/vmware/details?productId=353&rPId=5721&downloadGr oup=VR5513 https://my.vmware.com/web/vmware/details?downloadGroup=VR5122&productId=285 &rPId=6779 Documentation: http://kb.vmware.com/kb/2091019 http://kb.vmware.com/kb/2091033 http://kb.vmware.com/kb/2091035 vSphere Storage Appliance ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc tId=354&rPId=6585 https://my.vmware.com/web/vmware/details?downloadGroup=VSP51-VSA-513&produc tId=297&rPId=3752 Documentation: http://kb.vmware.com/kb/2091000 http://kb.vmware.com/kb/2091086 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. 2014-10-01 VMSA-2014-0010.1 Updated advisory in conjunction with the release of ESX 4.x patches, vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added CVE-2014-6277 and CVE-2014-6278 as they have been confirmed to be mitigated. 2014-10-01 VMSA-2014-0010.2 Updated advisory in conjunction with the release of Horizon Workspace patches, IT Business Management Suite 1.1.0 and 1.0.1, vCenter Operations Manager patches, vCenter Site Recovery Manager 5.5.1.3 and 5.1.2.2, vCloud Application Director patches, vCloud Automation Center patches, vCloud Automation Center Application Services patches, vCloud Director Appliance 5.5.1.3, vFabric Postgres 9.3.5.1, 9.2.9.1, and 9.1.14.1, vSphere Replication 5.8.0.1, 5.5.1.3, and 5.1.2.2 on 2014-10-01. 2014-10-02 VMSA-2014-0010.3 Updated advisory in conjunction with the release of vCenter Hyperic Server 5.8.3, 5.7.2, and 5.0.3, vCenter Infrastructure Navigator 5.8.3, 5.7.1, and 2.0.1 vCenter Orchestrator Appliance patches, vCenter Support Assistant patches, vSphere App HA 1.1.1, vSphere Management Assistant 5.5 EP1 and 5.0 EP1 and vSphere Storage Appliance patches on 2014-10-02 - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFULZh6DEcm8Vbi9kMRAtJuAJoCepB6VTQBT4ccSzyB/e5V/POFTACeLIZq L8DyxvSy6zG5yCwxFsx4uSg= =q++D -----END PGP SIGNATURE-----
UPDATED VMSA-2014-0010.2 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010.2 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-10-01 CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) ESX 4.1 without patch ESX410-201410401-SG ESX 4.0 without patch ESX400-201410401-SG vCenter Server Appliance prior to 5.5 U2a vCenter Server Appliance prior to 5.1 U2b vCenter Server Appliance prior to 5.0 U3b Horizon Workspace 1.x, 2.x without patch IT Business Management Suite prior to 1.1.0 IT Business Management Suite prior to 1.0.1 vCenter Log Insight prior to 2.0U1 vCenter Operations Manager 5.x without patch vCenter Site Recovery Manager prior to 5.5.1.3 vCenter Site Recovery Manager prior to 5.1.2.2 vCloud Application Director 5.x, 6.x without patch vCloud Automation Center 6.x without patch vCloud Automation Center Application Services 6.x without patch vCloud Director Appliance prior to 5.5.1.3 vFabric Postgres prior to 9.3.5.1 vFabric Postgres prior to 9.2.9.1 vFabric Postgres prior to 9.1.14.1 VMware Data Recovery prior to 2.0.4 VMware Mirage Gateway prior to 5.1.1 vSphere Replication prior to 5.8.0.1 vSphere Replication prior to 5.5.1.3 vSphere Replication prior to 5.1.2.2 vSphere Storage Appliance prior to 5.5.2 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX ESX410-201410401-SG* ESX 4.0 ESX ESX400-201410401-SG* * VMware has made VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================ vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b, 5.0 U3b Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux See Section 4 IT Business Management Suite 1.x Linux 1.1.0, 1.0.1 NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending** vCenter Hyperic Server 5.x Linux Patch Pending vCenter Infrastructure Navigator 5.x Linux Patch Pending vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux See Section 4 vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending vCenter Site Recovery Manager 5.x Linux 5.5.1.3, 5.1.2.2, 5.0.x** vCenter Support Assistant 5.x Linux Patch Pending vCloud Application Director 5.x, 6.x Linux See Section 4 vCloud Automation Center 6.x Linux See Section 4 vCloud Automation Center Application Services 6.x Linux See Section 4 vCloud Director Appliance 5.x Linux 5.5.1.3 vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Postgres 9.x Linux 9.3.5.1, 9.2.9.1, 9.1.14.1 Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux 2.0.4 VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux 5.1.1 VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux 5.8.0.1, 5.5.1.3, 5.1.2.2 vSphere Storage Appliance 5.x Linux 5.5.2 ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution ESX --- Downloads: https://www.vmware.com/patchmgr/findPatch.portal Documentation: http://kb.vmware.com/kb/2090859 http://kb.vmware.com/kb/2090853 vCenter Server Appliance ------------------------ Downloads: https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2 (scroll down to 5.5 Update 2a Appliance) https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS P510-VC-51U2A (scroll down to 5.1 Update 2b Appliance) https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3 A (scroll down to 5.0 Update 3b Appliance) Documentation: http://kb.vmware.com/kb/2091085 http://kb.vmware.com/kb/2091018 http://kb.vmware.com/kb/2091017 Horizon Workspace ------------------------- Downloads: (Scroll down to the relevant download) Workspace Portal 2.1.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNP210 Workspace Portal 2.0.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNWS200 Horizon Workspace 1.8.2 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS182 Horizon Workspace 1.8.1 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS181 Horizon Workspace 1.8.0 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS180 Horizon Workspace 1.5.2 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS152 Horizon Workspace 1.5.1 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS151 Horizon Workspace 1.5.0 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS150 Documentation: http://kb.vmware.com/kb/2091067 IT Business Management Suite ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-110&product Id=384&rPId=6384 https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-101&product Id=385&rPId=6333 Documentation: http://kb.vmware.com/kb/2091014 http://kb.vmware.com/kb/2091013 vCenter Log Insight ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4 12&rPId=5804 Documentation: http://kb.vmware.com/kb/2091065 vCenter Operations Manager -------------------------- Downloads: https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-583-STD https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-573-STD Documentation: http://kb.vmware.com/kb/2091083 http://kb.vmware.com/kb/2091002 vCenter Site Recovery Manager ----------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=SRM5513&productId=35 7&rPId=6636 https://my.vmware.com/web/vmware/details?downloadGroup=SRM5122&productId=29 1&rPId=6631 Documentation: http://kb.vmware.com/kb/2091038 http://kb.vmware.com/kb/2091039 http://kb.vmware.com/kb/2091037 (5.0.x) vCloud Application Director --------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPDIR_601_GA&produc tId=383&rPId=6216 https://my.vmware.com/web/vmware/details?downloadGroup=VFAPPDIR_520_GA&prod uctId=345&rPId=3789 Documentation: http://kb.vmware.com/kb/2091129 vCloud Automation Center ------------------------ Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-610&productId=4 47&rPId=6501 https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-6012&productId= 383&rPId=6216 Documentation: http://kb.vmware.com/kb/2091012 vCloud Automation Center Application Services --------------------------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPSER_610&productId =447&rPId=6501 Documentation: http://kb.vmware.com/kb/2091129 vCloud Director Appliance ------------------------- Downloads: www.vmware.com/go/try-vcloud-director Documentation: http://kb.vmware.com/kb/2091071 vFabric Postgres ---------------- Downloads: https://my.vmware.com/web/vmware/info/slug/application_platform/vmware_vfab ric_postgres/9_3 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_2 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_1 Documentation: http://kb.vmware.com/kb/2091055 VMware Data Recovery -------------------- Downloads: https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204 Documentation: http://kb.vmware.com/kb/2091015 VMware Mirage Gateway --------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId =407&rPId=6565 (See VMware Mirage Gateway Software) Documentation: http://kb.vmware.com/kb/2091090 vSphere Replication ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VR5801&productId=353 &rPId=6654 https://my.vmware.com/web/vmware/details?productId=353&rPId=5721&downloadGr oup=VR5513 https://my.vmware.com/web/vmware/details?downloadGroup=VR5122&productId=285 &rPId=6779 Documentation: http://kb.vmware.com/kb/2091019 http://kb.vmware.com/kb/2091033 http://kb.vmware.com/kb/2091035 vSphere Storage Appliance ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc tId=354&rPId=6585 Documentation: http://kb.vmware.com/kb/2091000 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. 2014-10-01 VMSA-2014-0010.1 Updated advisory in conjunction with the release of ESX 4.x patches, vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added CVE-2014-6277 and CVE-2014-6278 as they have been confirmed to be mitigated. 2014-10-01 VMSA-2014-0010.2 Updated advisory in conjunction with the release of Horizon Workspace patches, IT Business Management Suite 1.1.0 and 1.0.1, vCenter Operations Manager patches, vCenter Site Recovery Manager 5.5.1.3 and 5.1.2.2, vCloud Application Director patches, vCloud Automation Center patches, vCloud Automation Center Application Services patches, vCloud Director Appliance 5.5.1.3, vFabric Postgres 9.3.5.1, 9.2.9.1, and 9.1.14.1, vSphere Replication 5.8.0.1, 5.5.1.3, and 5.1.2.2 on 2014-10-01. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFULM96DEcm8Vbi9kMRAlcPAJ0bXoybnDZKuYJXVDjQr81ay+5W+gCfWAfa Vjt9CUQxcJ0aEPQ1yC6gE/Y= =fjxQ -----END PGP SIGNATURE-----
UPDATED VMSA-2014-0010.2 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010.2 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-10-01 CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) ESX 4.1 without patch ESX410-201410401-SG ESX 4.0 without patch ESX400-201410401-SG vCenter Server Appliance prior to 5.5 U2a vCenter Server Appliance prior to 5.1 U2b vCenter Server Appliance prior to 5.0 U3b Horizon Workspace 1.x, 2.x without patch IT Business Management Suite prior to 1.1.0 IT Business Management Suite prior to 1.0.1 vCenter Log Insight prior to 2.0U1 vCenter Operations Manager 5.x without patch vCenter Site Recovery Manager prior to 5.5.1.3 vCenter Site Recovery Manager prior to 5.1.2.2 vCloud Application Director 5.x, 6.x without patch vCloud Automation Center 6.x without patch vCloud Automation Center Application Services 6.x without patch vCloud Director Appliance prior to 5.5.1.3 vFabric Postgres prior to 9.3.5.1 vFabric Postgres prior to 9.2.9.1 vFabric Postgres prior to 9.1.14.1 VMware Data Recovery prior to 2.0.4 VMware Mirage Gateway prior to 5.1.1 vSphere Replication prior to 5.8.0.1 vSphere Replication prior to 5.5.1.3 vSphere Replication prior to 5.1.2.2 vSphere Storage Appliance prior to 5.5.2 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX ESX410-201410401-SG* ESX 4.0 ESX ESX400-201410401-SG* * VMware has made VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================ vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b, 5.0 U3b Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux See Section 4 IT Business Management Suite 1.x Linux 1.1.0, 1.0.1 NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending** vCenter Hyperic Server 5.x Linux Patch Pending vCenter Infrastructure Navigator 5.x Linux Patch Pending vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux See Section 4 vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending vCenter Site Recovery Manager 5.x Linux 5.5.1.3, 5.1.2.2, 5.0.x** vCenter Support Assistant 5.x Linux Patch Pending vCloud Application Director 5.x, 6.x Linux See Section 4 vCloud Automation Center 6.x Linux See Section 4 vCloud Automation Center Application Services 6.x Linux See Section 4 vCloud Director Appliance 5.x Linux 5.5.1.3 vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Postgres 9.x Linux 9.3.5.1, 9.2.9.1, 9.1.14.1 Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux 2.0.4 VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux 5.1.1 VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux 5.8.0.1, 5.5.1.3, 5.1.2.2 vSphere Storage Appliance 5.x Linux 5.5.2 ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution ESX --- Downloads: https://www.vmware.com/patchmgr/findPatch.portal Documentation: http://kb.vmware.com/kb/2090859 http://kb.vmware.com/kb/2090853 vCenter Server Appliance ------------------------ Downloads: https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2 (scroll down to 5.5 Update 2a Appliance) https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS P510-VC-51U2A (scroll down to 5.1 Update 2b Appliance) https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3 A (scroll down to 5.0 Update 3b Appliance) Documentation: http://kb.vmware.com/kb/2091085 http://kb.vmware.com/kb/2091018 http://kb.vmware.com/kb/2091017 Horizon Workspace ------------------------- Downloads: (Scroll down to the relevant download) Workspace Portal 2.1.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNP210 Workspace Portal 2.0.0 -> https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr oup=HZNWS200 Horizon Workspace 1.8.2 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS182 Horizon Workspace 1.8.1 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS181 Horizon Workspace 1.8.0 -> https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr oup=HZNWS180 Horizon Workspace 1.5.2 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS152 Horizon Workspace 1.5.1 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS151 Horizon Workspace 1.5.0 -> https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr oup=HZNWS150 Documentation: http://kb.vmware.com/kb/2091067 IT Business Management Suite ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-110&product Id=384&rPId=6384 https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-101&product Id=385&rPId=6333 Documentation: http://kb.vmware.com/kb/2091014 http://kb.vmware.com/kb/2091013 vCenter Log Insight ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4 12&rPId=5804 Documentation: http://kb.vmware.com/kb/2091065 vCenter Operations Manager -------------------------- Downloads: https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-583-STD https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-573-STD Documentation: http://kb.vmware.com/kb/2091083 http://kb.vmware.com/kb/2091002 vCenter Site Recovery Manager ----------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=SRM5513&productId=35 7&rPId=6636 https://my.vmware.com/web/vmware/details?downloadGroup=SRM5122&productId=29 1&rPId=6631 Documentation: http://kb.vmware.com/kb/2091038 http://kb.vmware.com/kb/2091039 http://kb.vmware.com/kb/2091037 (5.0.x) vCloud Application Director --------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPDIR_601_GA&produc tId=383&rPId=6216 https://my.vmware.com/web/vmware/details?downloadGroup=VFAPPDIR_520_GA&prod uctId=345&rPId=3789 Documentation: http://kb.vmware.com/kb/2091129 vCloud Automation Center ------------------------ Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-610&productId=4 47&rPId=6501 https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-6012&productId= 383&rPId=6216 Documentation: http://kb.vmware.com/kb/2091012 vCloud Automation Center Application Services --------------------------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=APPSER_610&productId =447&rPId=6501 Documentation: http://kb.vmware.com/kb/2091129 vCloud Director Appliance ------------------------- Downloads: www.vmware.com/go/try-vcloud-director Documentation: http://kb.vmware.com/kb/2091071 vFabric Postgres ---------------- Downloads: https://my.vmware.com/web/vmware/info/slug/application_platform/vmware_vfab ric_postgres/9_3 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_2 https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab ric_postgres/9_1 Documentation: http://kb.vmware.com/kb/2091055 VMware Data Recovery -------------------- Downloads: https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204 Documentation: http://kb.vmware.com/kb/2091015 VMware Mirage Gateway --------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId =407&rPId=6565 (See VMware Mirage Gateway Software) Documentation: http://kb.vmware.com/kb/2091090 vSphere Replication ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VR5801&productId=353 &rPId=6654 https://my.vmware.com/web/vmware/details?productId=353&rPId=5721&downloadGr oup=VR5513 https://my.vmware.com/web/vmware/details?downloadGroup=VR5122&productId=285 &rPId=6779 Documentation: http://kb.vmware.com/kb/2091019 http://kb.vmware.com/kb/2091033 http://kb.vmware.com/kb/2091035 vSphere Storage Appliance ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc tId=354&rPId=6585 Documentation: http://kb.vmware.com/kb/2091000 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. 2014-10-01 VMSA-2014-0010.1 Updated advisory in conjunction with the release of ESX 4.x patches, vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added CVE-2014-6277 and CVE-2014-6278 as they have been confirmed to be mitigated. 2014-10-01 VMSA-2014-0010.2 Updated advisory in conjunction with the release of Horizon Workspace patches, IT Business Management Suite 1.1.0 and 1.0.1, vCenter Operations Manager patches, vCenter Site Recovery Manager 5.5.1.3 and 5.1.2.2, vCloud Application Director patches, vCloud Automation Center patches, vCloud Automation Center Application Services patches, vCloud Director Appliance 5.5.1.3, vFabric Postgres 9.3.5.1, 9.2.9.1, and 9.1.14.1, vSphere Replication 5.8.0.1, 5.5.1.3, and 5.1.2.2 on 2014-10-01. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFULM96DEcm8Vbi9kMRAlcPAJ0bXoybnDZKuYJXVDjQr81ay+5W+gCfWAfa Vjt9CUQxcJ0aEPQ1yC6gE/Y= =fjxQ -----END PGP SIGNATURE-----
UPDATED VMSA-2014-0010.1 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010.1 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-10-01 CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) ESX 4.1 without patch ESX410-201410401-SG ESX 4.0 without patch ESX400-201410401-SG vCenter Server Appliance prior to 5.5 U2a vCenter Server Appliance prior to 5.1 U2b vCenter Server Appliance prior to 5.0 U3b vCloud Director Appliance prior to 5.5.1.3 VMware Data Recovery prior to 2.0.4 VMware Mirage Gateway prior to 5.1.1 vSphere Storage Appliance prior to 5.5.2 vCenter Log Insight prior to 2.0U1 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX ESX410-201410401-SG* ESX 4.0 ESX ESX400-201410401-SG* * VMware has made VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================ vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b, 5.0 U3b Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux Patch Pending IT Business Management Suite 1.x Linux Patch Pending NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending ** vCenter Hyperic Server 5.x Linux Patch Pending vCenter Infrastructure Navigator 5.x Linux Patch Pending vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux Patch Pending vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending vCenter Site Recovery Manager 5.x Linux Patch Pending ** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux 5.5.1.3 vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux 2.0.4 VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux 5.1.1 VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux 5.5.2 ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution ESX --- Downloads: https://www.vmware.com/patchmgr/findPatch.portal Documentation: http://kb.vmware.com/kb/2090859 http://kb.vmware.com/kb/2090853 vCenter Server Appliance ------------------------ Downloads: https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2 (scroll down to 5.5 Update 2a Appliance) https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS P510-VC-51U2A (scroll down to 5.1 Update 2b Appliance) https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3 A (scroll down to 5.0 Update 3b Appliance) Documentation: http://kb.vmware.com/kb/2091085 http://kb.vmware.com/kb/2091018 http://kb.vmware.com/kb/2091017 vCloud Director Appliance ------------------------- Downloads: www.vmware.com/go/try-vcloud-director Documentation: http://kb.vmware.com/kb/2091071 VMware Data Recovery -------------------- Downloads: https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204 Documentation: http://kb.vmware.com/kb/2091015 VMware Mirage Gateway --------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId =407&rPId=6565 (See VMware Mirage Gateway Software) Documentation: http://kb.vmware.com/kb/2091090 vSphere Storage Appliance ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc tId=354&rPId=6585 Documentation: http://kb.vmware.com/kb/2091000 vCenter Log Insight ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4 12&rPId=5804 Documentation: http://kb.vmware.com/kb/2091065 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. 2014-10-01 VMSA-2014-0010.1 Updated advisory in conjunction with the release of ESX 4.x patches, vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added CVE-2014-6277 and CVE-2014-6278 as confirmed fixed. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFULDR2DEcm8Vbi9kMRAno8AKChLzy32utif3LnJt4DduKNpmH1MgCgqKl+ ycAq/Gx4gCwu6SjbjBdgmSs= =81FF -----END PGP SIGNATURE-----
UPDATED VMSA-2014-0010.1 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010.1 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-10-01 CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) ESX 4.1 without patch ESX410-201410401-SG ESX 4.0 without patch ESX400-201410401-SG vCenter Server Appliance prior to 5.5 U2a vCenter Server Appliance prior to 5.1 U2b vCenter Server Appliance prior to 5.0 U3b vCloud Director Appliance prior to 5.5.1.3 VMware Data Recovery prior to 2.0.4 VMware Mirage Gateway prior to 5.1.1 vSphere Storage Appliance prior to 5.5.2 vCenter Log Insight prior to 2.0U1 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX ESX410-201410401-SG* ESX 4.0 ESX ESX400-201410401-SG* * VMware has made VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ================ vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b, 5.0 U3b Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux Patch Pending IT Business Management Suite 1.x Linux Patch Pending NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending ** vCenter Hyperic Server 5.x Linux Patch Pending vCenter Infrastructure Navigator 5.x Linux Patch Pending vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux Patch Pending vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending vCenter Site Recovery Manager 5.x Linux Patch Pending ** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux 5.5.1.3 vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux 2.0.4 VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux 5.1.1 VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux 5.5.2 ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution ESX --- Downloads: https://www.vmware.com/patchmgr/findPatch.portal Documentation: http://kb.vmware.com/kb/2090859 http://kb.vmware.com/kb/2090853 vCenter Server Appliance ------------------------ Downloads: https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2 (scroll down to 5.5 Update 2a Appliance) https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS P510-VC-51U2A (scroll down to 5.1 Update 2b Appliance) https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3 A (scroll down to 5.0 Update 3b Appliance) Documentation: http://kb.vmware.com/kb/2091085 http://kb.vmware.com/kb/2091018 http://kb.vmware.com/kb/2091017 vCloud Director Appliance ------------------------- Downloads: www.vmware.com/go/try-vcloud-director Documentation: http://kb.vmware.com/kb/2091071 VMware Data Recovery -------------------- Downloads: https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204 Documentation: http://kb.vmware.com/kb/2091015 VMware Mirage Gateway --------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId =407&rPId=6565 (See VMware Mirage Gateway Software) Documentation: http://kb.vmware.com/kb/2091090 vSphere Storage Appliance ------------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc tId=354&rPId=6585 Documentation: http://kb.vmware.com/kb/2091000 vCenter Log Insight ------------------- Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4 12&rPId=5804 Documentation: http://kb.vmware.com/kb/2091065 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. 2014-10-01 VMSA-2014-0010.1 Updated advisory in conjunction with the release of ESX 4.x patches, vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added CVE-2014-6277 and CVE-2014-6278 as confirmed fixed. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFULDR2DEcm8Vbi9kMRAno8AKChLzy32utif3LnJt4DduKNpmH1MgCgqKl+ ycAq/Gx4gCwu6SjbjBdgmSs= =81FF -----END PGP SIGNATURE-----
NEW VMSA-2014-0010 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-09-30 (Initial Advisory) CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) vCenter Log Insight 2.0 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX Patch pending * ESX 4.0 ESX Patch pending * * VMware will make VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= vCenter Server Appliance 5.x Linux Patch Pending Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux Patch Pending IT Business Management Suite 1.x Linux Patch Pending NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending vCenter Hyperic Server 5.x Linux Patch Pending vCenter Infrastructure Navigator 5.x Linux Patch Pending vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux Patch Pending vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending vCenter Site Recovery Manager 5.x Linux Patch Pending ** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux Patch Pending vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux Patch Pending VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux Patch Pending VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux Patch Pending ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution vCenter Log Insight ---------------------------- Downloads: https://www.vmware.com/go/download-vcenter-log-insight (click Go to Downloads) Documentation: http://kb.vmware.com/kb/2091065 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFUK2DqDEcm8Vbi9kMRAg4rAJ9wKbbbxeD3cagCry7GGfR4fVLpDwCeMqYm SfX/140WMvqvcmkPX2chR9s= =1KVR -----END PGP SIGNATURE-----
NEW VMSA-2014-0010 – VMware product updates address critical Bash security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware Security Advisory Advisory ID: VMSA-2014-0010 Synopsis: VMware product updates address critical Bash security vulnerabilities Issue date: 2014-09-30 Updated on: 2014-09-30 (Initial Advisory) CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187 - ------------------------------------------------------------------------ 1. Summary VMware product updates address Bash security vulnerabilities. 2. Relevant Releases (Affected products for which remediation is present) vCenter Log Insight 2.0 3. Problem Description a. Bash update for multiple products. Bash libraries have been updated in multiple products to resolve multiple critical security issues, also referred to as Shellshock. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187 to these issues. VMware products have been grouped into the following four product categories: I) ESXi and ESX Hypervisor ESXi is not affected because ESXi uses the Ash shell (through busybox), which is not affected by the vulnerability reported for the Bash shell. ESX has an affected version of the Bash shell. See table 1 for remediation for ESX. II) Windows-based products Windows-based products, including all versions of vCenter Server running on Windows, are not affected. III) VMware (virtual) appliances VMware (virtual) appliances ship with an affected version of Bash. See table 2 for remediation for appliances. IV) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) Products that run on Linux, Android, OSX or iOS (excluding virtual appliances) might use the Bash shell that is part of the operating system. If the operating system has a vulnerable version of Bash, the Bash security vulnerability might be exploited through the product. VMware recommends that customers contact their operating system vendor for a patch. MITIGATIONS VMware encourages restricting access to appliances through firewall rules and other network layer controls to only trusted IP addresses. This measure will greatly reduce any risk to these appliances. RECOMMENDATIONS VMware recommends customers evaluate and deploy patches for affected products in Table 1 and 2 below as these patches become available. Column 4 of the following tables lists the action required to remediate the vulnerability in each release, if a solution is available. Table 1 - ESXi and ESX Hypervisor ================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= ESXi any ESXi Not affected ESX 4.1 ESX Patch pending * ESX 4.0 ESX Patch pending * * VMware will make VMware ESX 4.0 and 4.1 security patches available for the Bash shell vulnerability. This security patch release is an exception to the existing VMware lifecycle policy. Table 2 - Products that are shipped as a (virtual) appliance. ============================================================= VMware Product Running Replace with/ Product Version on Apply Patch ============== ======= ======= ============= vCenter Server Appliance 5.x Linux Patch Pending Horizon DaaS Platform 6.x Linux Patch Pending Horizon Workspace 1.x, 2.x Linux Patch Pending IT Business Management Suite 1.x Linux Patch Pending NSX for Multi-Hypervisor 4.x Linux Patch Pending NSX for vSphere 6.x Linux Patch Pending NVP 3.x Linux Patch Pending vCenter Converter Standalone 5.x Linux Patch Pending vCenter Hyperic Server 5.x Linux Patch Pending vCenter Infrastructure Navigator 5.x Linux Patch Pending vCenter Log Insight 1.x, 2.x Linux 2.0 U1 vCenter Operations Manager 5.x Linux Patch Pending vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending vCenter Site Recovery Manager 5.x Linux Patch Pending ** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux Patch Pending vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux Patch Pending VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux Patch Pending VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux Patch Pending ** This product includes Virtual Appliances that will be updated, the product itself is not a Virtual Appliance. 4. Solution vCenter Log Insight ---------------------------- Downloads: https://www.vmware.com/go/download-vcenter-log-insight (click Go to Downloads) Documentation: http://kb.vmware.com/kb/2091065 5. References VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187 - ------------------------------------------------------------------------ 6. Change Log 2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFUK2DqDEcm8Vbi9kMRAg4rAJ9wKbbbxeD3cagCry7GGfR4fVLpDwCeMqYm SfX/140WMvqvcmkPX2chR9s= =1KVR -----END PGP SIGNATURE-----
NEW VMSA-2014-0009 VMware NSX and vCNS product updates address a critical information disclosure vulnerability
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2014-0009 Synopsis: VMware NSX and vCNS product updates address a critical information disclosure vulnerability Issue date: 2014-09-11 Updated on: 2014-09-11 (Initial Advisory) CVE number: CVE-2014-3796 - ------------------------------------------------------------------------ 1. Summary VMware NSX and vCloud Networking and Security (vCNS) product updates address a vulnerability that could lead to critical information disclosure. 2. Relevant releases NSX 6.0 prior to 6.0.6 vCNS 5.5 prior to 5.5.3 vCNS 5.1.4 prior to 5.1.4.2 3. Problem Description a. VMware NSX and vCNS information disclosure vulnerability VMware NSX and vCNS contain an input validation vulnerability. This issue may allow for critical information disclosure. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-3796 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware ProductRunning Replace with/ Product Versionon Apply Patch ============= ============== ================= NSX Edge 6.1 any not affected NSX Edge 6.0 any 6.0.6 vCNS Edge 5.5 any 5.5.3 vCNS Edge 5.1 any 5.1.4.2 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware NSX ---------- Downloads: https://www.vmware.com/go/download-nsx-vsphere Documentation: https://www.vmware.com/support/pubs/nsx_pubs.html vCNS ---- Downloads: https://www.vmware.com/go/download-vcd-ns Documentation: https://www.vmware.com/support/pubs/vshield_pubs.html 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3796 - ------------------------------------------------------------------------ 6. Change log 2014-09-11 VMSA-2014-0009 Initial security advisory in conjunction with the release of VMware NSX 6.1 and 6.0.6 and 5.1.4.2 on 2014-09-11. vCNS 5.5.3 was released on 2014-09-09. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFUEeSmDEcm8Vbi9kMRAvS+AKDNN3ikZZCVNUXMMjr8JhXprLy+OACfSFgC 2sLRyfwcA1eVX5lpJWABXPI= =F5rV -----END PGP SIGNATURE-----
NEW VMSA-2014-0009 VMware NSX and vCNS product updates address a critical information disclosure vulnerability
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2014-0009 Synopsis: VMware NSX and vCNS product updates address a critical information disclosure vulnerability Issue date: 2014-09-11 Updated on: 2014-09-11 (Initial Advisory) CVE number: CVE-2014-3796 - ------------------------------------------------------------------------ 1. Summary VMware NSX and vCloud Networking and Security (vCNS) product updates address a vulnerability that could lead to critical information disclosure. 2. Relevant releases NSX 6.0 prior to 6.0.6 vCNS 5.5 prior to 5.5.3 vCNS 5.1.4 prior to 5.1.4.2 3. Problem Description a. VMware NSX and vCNS information disclosure vulnerability VMware NSX and vCNS contain an input validation vulnerability. This issue may allow for critical information disclosure. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-3796 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware ProductRunning Replace with/ Product Versionon Apply Patch ============= ============== ================= NSX Edge 6.1 any not affected NSX Edge 6.0 any 6.0.6 vCNS Edge 5.5 any 5.5.3 vCNS Edge 5.1 any 5.1.4.2 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware NSX ---------- Downloads: https://www.vmware.com/go/download-nsx-vsphere Documentation: https://www.vmware.com/support/pubs/nsx_pubs.html vCNS ---- Downloads: https://www.vmware.com/go/download-vcd-ns Documentation: https://www.vmware.com/support/pubs/vshield_pubs.html 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3796 - ------------------------------------------------------------------------ 6. Change log 2014-09-11 VMSA-2014-0009 Initial security advisory in conjunction with the release of VMware NSX 6.1 and 6.0.6 and 5.1.4.2 on 2014-09-11. vCNS 5.5.3 was released on 2014-09-09. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2014 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.0 (Build 8741) Charset: utf-8 wj8DBQFUEeSmDEcm8Vbi9kMRAvS+AKDNN3ikZZCVNUXMMjr8JhXprLy+OACfSFgC 2sLRyfwcA1eVX5lpJWABXPI= =F5rV -----END PGP SIGNATURE-----