NEW VMSA-2014-0008 VMware vSphere product updates to third party libraries

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2014-0008
Synopsis:    VMware vSphere product updates to third party libraries
Issue date:  2014-09-09
Updated on:  2014-09-09 (Initial Advisory)
CVE numbers:  --- Struts ---
             CVE-2014-0114
             --- tc-server ---
              CVE-2013-4590, CVE-2013-4322, and CVE-2014-0050
             --- glibc ---
             CVE-2013-0242 and CVE-2013-1914
             --- JRE ---
             See references
- ------------------------------------------------------------------------

1. Summary

    VMware has updated vSphere third party libraries

2. Relevant releases

 
    VMware vCenter Server 5.5 prior to Update 2

    VMware vCenter Update Manager 5.5 prior to Update 2

    VMware ESXi 5.5 without patch ESXi550-201409101-SG


3. Problem Description

   a. vCenter Server Apache Struts Update

      The Apache Struts library is updated to address a security issue.  

      This issue may lead to remote code execution after authentication.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2014-0114 to this issue.


      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         ProductRunningReplace with/
      Product        Versionon      Apply Patch
      =============  ===============================
      vCenter Server 5.5       any         5.5 Update 2
      vCenter Server 5.1       any         Patch Pending
      vCenter Server 5.0       any         Patch Pending

   b. vCenter Server tc-server 2.9.5 / Apache Tomcat 7.0.52 updates

      tc-server has been updated to version 2.9.5 to address multiple 
      security issues. This version of tc-server includes Apache Tomcat 
      7.0.52.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2013-4590, CVE-2013-4322, and 
      CVE-2014-0050 to these issues. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                 ProductRunning    Replace with/
      Product                Versionon     Apply Patch
      =============          ==============    =================
      vCenter Server         5.5     any        5.5 Update 2
      vCenter Server         5.1     any        Patch Pending
      vCenter Server         5.0     any        Patch Pending
 
   c. Update to ESXi glibc package

      glibc is updated to address multiple security issues.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2013-0242 and CVE-2013-1914 to 
      these issues. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         ProductRunning  Replace with/
      Product        Versionon   Apply Patch
      =============  ==============  =================
      ESXi           5.5       any      ESXi550-201409101-SG
      ESXi           5.1       any      Patch Pending
      ESXi           5.0       any      Patch Pending

d. vCenter and Update Manager, Oracle JRE 1.7 Update 55

      Oracle has documented the CVE identifiers that are addressed in 
      JRE 1.7.0 update 55 in the Oracle Java SE Critical Patch Update 
      Advisory of April 2014. The References section provides a link to
      this advisory.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                 ProductRunning  Replace with/
      Product                Versionon       Apply Patch
      =============          ==============  =================
      vCenter Server         5.5     any      5.5 Update 2
      vCenter Server         5.1     any      not applicable *
      vCenter Server         5.0     any      not applicable *
      vCenter Update Manager 5.5     any      5.5 Update 2
      vCenter Update Manager 5.1     any      not applicable *
      vCenter Update Manager 5.0     any      not applicable *
 
      * this product uses the Oracle JRE 1.6.0 family *

4. Solution

   Please review the patch/release notes for your product and version 
   and verify the checksum of your downloaded file. 

 
   vCenter Server and Update Manager 5.5u2
   ---------------------------------------
   Downloads and Documentation:
   https://www.vmware.com/go/download-vsphere

   ESXi 5.5
   --------
   Download:
   https://www.vmware.com/patchmgr/findPatch.portal
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914

   JRE
   ---
   Oracle Java SE Critical Patch Update Advisory of April 2014
  
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html


- ------------------------------------------------------------------------

6. Change log

   2014-09-09 VMSA-2014-0008
   Initial security advisory in conjunction with the release of vSphere
   5.5 Update 2 on 2014-09-09.

- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2014 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFUD2LADEcm8Vbi9kMRAp0lAKCCB15Aa21ThBMqWRJTeYEweSVrdQCaAsNC
he8AihUDo3UB9amCBiImxq0=
=W0+t
-----END PGP SIGNATURE-----

Leave a Reply