-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2014-0010.8
Synopsis: VMware product updates address critical Bash
security vulnerabilities
Issue date: 2014-09-30
Updated on: 2014-10-06
CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186,
CVE-2014-7187, CVE-2014-6277, CVE-2014-6278
- ------------------------------------------------------------------------
1. Summary
VMware product updates address Bash security vulnerabilities.
2. Relevant Releases (Affected products for which remediation is present)
ESX 4.1 without patch ESX410-201410401-SG
ESX 4.0 without patch ESX400-201410401-SG
vCenter Server Appliance prior to 5.5 U2a
vCenter Server Appliance prior to 5.1 U2b
vCenter Server Appliance prior to 5.0 U3b
Horizon DaaS Platform prior to 6.1.1
Horizon DaaS Platform prior to 6.0.2
Horizon DaaS Platform prior to 5.4.3
Horizon Workspace 1.x, 2.x without patch
IT Business Management Suite prior to 1.1.0
IT Business Management Suite prior to 1.0.1
NSX for Multi-Hypervisor 4.2.x prior to 4.2.1
NSX for Multi-Hypervisor 4.1.x prior to 4.1.4
NSX for Multi-Hypervisor 4.0.x prior to 4.0.5
NSX for vSphere 6.1.x prior to 6.1.1
NSX for vSphere 6.0.x prior to 6.0.7
NVP 3.x prior to 3.2.4
vCenter Hyperic Server prior to 5.8.3
vCenter Hyperic Server 5.8.2 without SP3
vCenter Hyperic Server 5.8.1 without SP3
vCenter Hyperic Server 5.8.0 without SP2
vCenter Hyperic Server prior to 5.7.2
vCenter Hyperic Server 5.7.1 without SP1
vCenter Hyperic Server prior to 5.0.3
vCenter Hyperic Server 5.0.2 without SP1
vCenter Infrastructure Navigator prior to 5.8.3
vCenter Infrastructure Navigator prior to 5.7.1
vCenter Infrastructure Navigator prior to 2.0.1
vCenter Log Insight prior to 2.0U1
vCenter Log Insight prior to 1.5.0U1
vCenter Operations Manager 5.x without patch
vCenter Orchestrator Appliance 5.5.x prior to 5.5.2.1
vCenter Orchestrator Appliance 5.1.x, 4.x without patch
vCenter Site Recovery Manager prior to 5.5.1.3
vCenter Site Recovery Manager prior to 5.1.2.2
vCenter Support Assistant without patch
vCloud Application Director 5.x, 6.x without patch
vCloud Automation Center 6.x without patch
vCloud Automation Center Application Services 6.x without patch
vCloud Director Appliance prior to 5.5.1.3
vCloud Connector prior to 2.6.1
vCloud Networking and Security prior to 5.5.3.1
vCloud Networking and Security prior to 5.1.4.3
vCloud Usage Meter prior to 3.3.2
vFabric Postgres prior to 9.3.5.1
vFabric Postgres prior to 9.2.9.1
vFabric Postgres prior to 9.1.14.1
VMware Application Dependency Planner prior to 2.0.0.1
View Planner prior to 3.0.1.1
VMware Data Recovery prior to 2.0.4
VMware HealthAnalyzer prior to 5.0.3.1
VMware Mirage Gateway prior to 5.1.1
vSphere App HA prior to 1.1.1
vSphere App HA 1.1.0 without patch
vSphere Big Data Extensions 2.x without patch
vSphere Data Protection 5.x without patch
vSphere Management Assistant 5.5.x without 5.5 EP1
vSphere Management Assistant 5.0.x without 5.0 EP1
vSphere Replication prior to 5.8.0.1
vSphere Replication prior to 5.6.0.2
vSphere Replication prior to 5.5.1.3
vSphere Replication prior to 5.1.2.2
vSphere Storage Appliance prior to 5.5.2
vSphere Storage Appliance 5.1.x without patch
3. Problem Description
a. Bash update for multiple products.
Bash libraries have been updated in multiple products to resolve
multiple critical security issues, also referred to as Shellshock.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifiers CVE-2014-6271, CVE-2014-7169,
CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278
to these issues.
VMware products have been grouped into the following four
product categories:
I) ESXi and ESX Hypervisor
ESXi is not affected because ESXi uses the Ash shell (through
busybox), which is not affected by the vulnerability reported
for the Bash shell.
ESX has an affected version of the Bash shell. See table 1 for
remediation for ESX.
II) Windows-based products
Windows-based products, including all versions of vCenter Server
running on Windows, are not affected.
III) VMware (virtual) appliances
VMware (virtual) appliances ship with an affected version of Bash.
See table 2 for remediation for appliances.
IV) Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances)
Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances) might use the Bash shell that is part of the
operating system. If the operating system has a vulnerable
version of Bash, the Bash security vulnerability might be
exploited through the product. VMware recommends that customers
contact their operating system vendor for a patch.
MITIGATIONS
VMware encourages restricting access to appliances through
firewall rules and other network layer controls to only trusted IP
addresses. This measure will greatly reduce any risk to these
appliances.
RECOMMENDATIONS
VMware recommends customers evaluate and deploy patches for
affected products in Table 1 and 2 below as these
patches become available.
Column 4 of the following tables lists the action required to
remediate the vulnerability in each release, if a solution is
available.
Table 1 - ESXi and ESX Hypervisor
=================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
ESXi any ESXi Not affected
ESX 4.1 ESX ESX410-201410401-SG*
ESX 4.0 ESX ESX400-201410401-SG*
* VMware has made VMware ESX 4.0 and 4.1 security patches available
for the Bash shell vulnerability. This security patch release is an
exception to the existing VMware lifecycle policy.
Table 2 - Products that are shipped as a (virtual) appliance.
=============================================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= ================
vCenter Server Appliance 5.x Linux 5.5 U2a, 5.1 U2b,
5.0 U3b
Horizon DaaS Platform 5.x, 6.x Linux 6.1.1, 6.0.2,
5.4.3
Horizon Workspace 1.x, 2.x Linux See Section 4
IT Business Management Suite 1.x Linux 1.1.0, 1.0.1
NSX for Multi-Hypervisor 4.x Linux 4.2.1, 4.1.4
4.0.5
NSX for vSphere 6.x Linux 6.1.1, 6.0.7
NVP 3.x Linux 3.2.4
vCenter Converter Standalone 5.x Linux Patch Pending**
vCenter Hyperic Server* 5.x Linux 5.8.3, 5.8.2-SP3,
5.8.1-SP3,
5.8.0-SP2,
5.7.2, 5.7.1-SP1,
5.0.3, 5.0.2-SP1
vCenter Infrastructure Navigator 2.x, 5.x Linux 5.8.3, 5.7.1,
2.0.1
vCenter Log Insight 1.x, 2.x Linux 2.0 U1, 1.5.0U1
vCenter Operations Manager 5.x Linux See Section 4
vCenter Orchestrator Appliance* 4.x, 5.x Linux 5.5.2.1, 5.1.2,
4.2.3 See Section
4
vCenter Site Recovery Manager 5.x Linux 5.5.1.3, 5.1.2.2,
5.0.x**
vCenter Support Assistant 5.x Linux See Section 4
vCloud Application Director 5.x, 6.x Linux See Section 4
vCloud Automation Center 6.x Linux See Section 4
vCloud Automation Center
Application Services 6.x Linux See Section 4
vCloud Director Appliance 5.x Linux 5.5.1.3
vCloud Connector 2.x Linux 2.6.1
vCloud Networking and Security 5.x Linux 5.5.3.1, 5.1.4.3
vCloud Usage Meter 3.x Linux 3.3.2
vFabric Postgres 9.x Linux 9.3.5.1, 9.2.9.1,
9.1.14.1
View Planner 3.x Linux 3.0.1.1
VMware Application Dependency x.x Linux 2.0.0.1
Planner
VMware Data Recovery 2.x Linux 2.0.4
VMware HealthAnalyzer 5.x Linux 5.0.3.1
VMware Mirage Gateway 5.x Linux 5.1.1
VMware Socialcast On Premise 2.x Linux Patch Pending
VMware Studio 2.x Linux Patch Pending
VMware Workbench 3.x Linux Patch Pending
vSphere App HA* 1.x Linux 1.1.1
vSphere Big Data Extensions 2.x Linux See Section 4
vSphere Data Protection 5.x Linux See Section 4
vSphere Management Assistant 5.x Linux 5.5 EP1, 5.0 EP1
vSphere Replication 5.x Linux 5.8.0.1, 5.6.0.2,
5.5.1.3, 5.1.2.2
vSphere Storage Appliance* 5.x Linux 5.5.2, 5.1.3
See Section 4
* This product has patches available to update bash manually as well as
a full
installation that includes the bash fix for some versions. Either
installing
the patch or upgrading the appliance will remediate the "shellshock"
vulnerability. See documentation in Section 4 for details.
** This product includes Virtual Appliances that will be updated, the
product
itself is not a Virtual Appliance.
4. Solution
ESX
---
Downloads:
https://www.vmware.com/patchmgr/findPatch.portal
Documentation:
http://kb.vmware.com/kb/2090859
http://kb.vmware.com/kb/2090853
vCenter Server Appliance
------------------------
Downloads:
https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2
(scroll down to 5.5 Update 2a Appliance)
https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS
P510-VC-51U2A
(scroll down to 5.1 Update 2b Appliance)
https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3
A
(scroll down to 5.0 Update 3b Appliance)
Documentation:
http://kb.vmware.com/kb/2091085
http://kb.vmware.com/kb/2091018
http://kb.vmware.com/kb/2091017
Horizon DaaS Platform
---------------------
Downloads:
https://my.vmware.com/web/vmware/details?productId=405&rPId=6527&downloadGr
oup=HORIZON-DAAS-610-BIN
https://my.vmware.com/web/vmware/details?productId=405&downloadGroup=HORIZO
N-DAAS-602
https://my.vmware.com/web/vmware/details?downloadGroup=HORIZON-DAAS-ONPREM-
540&productId=398
Documentation:
http://kb.vmware.com/kb/2091183
Horizon Workspace
-----------------
Downloads:
(Scroll down to the relevant download)
Workspace Portal 2.1.0 ->
https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr
oup=HZNP210
Workspace Portal 2.0.0 ->
https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr
oup=HZNWS200
Horizon Workspace 1.8.2 ->
https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr
oup=HZNWS182
Horizon Workspace 1.8.1 ->
https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr
oup=HZNWS181
Horizon Workspace 1.8.0 ->
https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr
oup=HZNWS180
Horizon Workspace 1.5.2 ->
https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr
oup=HZNWS152
Horizon Workspace 1.5.1 ->
https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr
oup=HZNWS151
Horizon Workspace 1.5.0 ->
https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr
oup=HZNWS150
Documentation:
http://kb.vmware.com/kb/2091067
IT Business Management Suite
----------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-110&product
Id=384&rPId=6384
https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-101&product
Id=385&rPId=6333
Documentation:
http://kb.vmware.com/kb/2091014
http://kb.vmware.com/kb/2091013
NSX for Multi-Hypervisor
------------------------
Downloads:
https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-MH-421
https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-MH-414
Note: For 4.0.5 refer to http://www.vmware.com/products/nsx
Documentation:
http://kb.vmware.com/kb/2091179
http://kb.vmware.com/kb/2091205
NSX for vSphere
---------------
Downloads:
https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-V-611
https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-V-607
Documentation:
http://kb.vmware.com/kb/2091213
http://kb.vmware.com/kb/2091216
NVP
---
Downloads and Documentation:
http://www.vmware.com/products/nsx
vCenter Hyperic Server
----------------------
Downloads:
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCHQ_583_AGENT
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCHQ_583_SERVER
https://my.vmware.com/web/vmware/details?productId=378&rPId=6386&downloadGr
oup=VCHQ_582_SERVER
https://my.vmware.com/web/vmware/details?productId=378&rPId=6386&downloadGr
oup=VCHQ_581_SERVER
https://my.vmware.com/web/vmware/details?productId=378&rPId=6386&downloadGr
oup=VCHQ_580_SERVER
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_572_AGENT
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_572
https://my.vmware.com/web/vmware/details?productId=346&rPId=6849&downloadGr
oup=VFHQ_571
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_503_AGENT
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_503_SERVER
https://my.vmware.com/web/vmware/details?productId=311&rPId=6848&downloadGr
oup=VFHQ_502
Documentation:
http://kb.vmware.com/kb/2091109
http://kb.vmware.com/kb/2091210
http://kb.vmware.com/kb/2091372
http://kb.vmware.com/kb/2091373
http://kb.vmware.com/kb/2091206
http://kb.vmware.com/kb/2091223
http://kb.vmware.com/kb/2091207
http://kb.vmware.com/kb/2091224
vCenter Infrastructure Navigator
--------------------------------
Downloads:
https://my.vmware.com/web/vmware/get-download?downloadGroup=VIN_583
https://my.vmware.com/web/vmware/get-download?downloadGroup=VIN_571
https://my.vmware.com/web/vmware/get-download?downloadGroup=VIN_201
Documentation:
http://kb.vmware.com/kb/2091095
http://kb.vmware.com/kb/2091093
http://kb.vmware.com/kb/2091108
vCenter Log Insight
-------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4
12&rPId=5804
https://my.vmware.com/group/vmware/details?downloadGroup=STRATA15&productId
=386&rPId=4787
Documentation:
http://kb.vmware.com/kb/2091065
http://kb.vmware.com/kb/2091065
vCenter Operations Manager
--------------------------
Downloads:
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-583-STD
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-573-STD
Documentation:
http://kb.vmware.com/kb/2091083
http://kb.vmware.com/kb/2091002
vCenter Orchestrator Appliance
------------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=VCL_VCOVA_5521&produ
ctId=353&rPId=6655
Documentation:
http://kb.vmware.com/kb/2091036
vCenter Site Recovery Manager
-----------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=SRM5513&productId=35
7&rPId=6636
https://my.vmware.com/web/vmware/details?downloadGroup=SRM5122&productId=29
1&rPId=6631
Documentation:
http://kb.vmware.com/kb/2091038
http://kb.vmware.com/kb/2091039
http://kb.vmware.com/kb/2091037 (5.0.x)
vCenter Support Assistant
-------------------------
Downloads and Documentation:
http://kb.vmware.com/kb/2091112
vCloud Application Director
---------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=APPDIR_601_GA&produc
tId=383&rPId=6216
https://my.vmware.com/web/vmware/details?downloadGroup=VFAPPDIR_520_GA&prod
uctId=345&rPId=3789
Documentation:
http://kb.vmware.com/kb/2091129
vCloud Automation Center
------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-610&productId=4
47&rPId=6501
https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-6012&productId=
383&rPId=6216
Documentation:
http://kb.vmware.com/kb/2091012
vCloud Automation Center Application Services
---------------------------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=APPSER_610&productId
=447&rPId=6501
Documentation:
http://kb.vmware.com/kb/2091129
vCloud Director Appliance
-------------------------
Downloads:
www.vmware.com/go/try-vcloud-director
Documentation:
http://kb.vmware.com/kb/2091071
vCloud Connector
----------------
Downloads:
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCC261-GA
Documentation:
http://kb.vmware.com/kb/2091045
vCloud Networking and Security
------------------------------
Downloads:
https://my.vmware.com/group/vmware/get-download?downloadGroup=VCNS5531
https://my.vmware.com/group/vmware/get-download?downloadGroup=VCNS5143
Documentation:
http://kb.vmware.com/kb/2091218
http://kb.vmware.com/kb/2091217
vCloud Usage Meter
------------------
Downloads:
https://my.vmware.com/web/vmware/get-download?downloadGroup=UMSV332
Documentation:
http://kb.vmware.com/kb/2091184
vFabric Postgres
----------------
Downloads:
https://my.vmware.com/web/vmware/info/slug/application_platform/vmware_vfab
ric_postgres/9_3
https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab
ric_postgres/9_2
https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab
ric_postgres/9_1
Documentation:
http://kb.vmware.com/kb/2091055
View Planner
------------
View Planner Benchmark Mode
Downloads:
https://my.vmware.com/web/vmware/details?productId=320&downloadGroup=VIEW-P
LAN-300
Documentation:
http://kb.vmware.com/kb/2091281
View Planner Flexible Mode
Downloads and Documentation:
https://na6.salesforce.com/06980000001EUza
VMware Application Dependency Planner
-------------------------------------
Downloads and Documentation:
https://na6.salesforce.com/06980000001EUzQ
VMware Data Recovery
--------------------
Downloads:
https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204
Documentation:
http://kb.vmware.com/kb/2091015
VMware HealthAnalyzer
---------------------
Downloads and Documentation:
https://na6.salesforce.com/06980000001EUzV
VMware Mirage Gateway
---------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId
=407&rPId=6565
(See VMware Mirage Gateway Software)
Documentation:
http://kb.vmware.com/kb/2091090
vSphere App HA
--------------
Downloads:
https://my.vmware.com/web/vmware/get-download?downloadGroup=APPHA-111
https://my.vmware.com/web/vmware/details?downloadGroup=APPHA-110&productId=
408&rPId=5635
Documentation:
http://kb.vmware.com/kb/2091087
http://kb.vmware.com/kb/2091371
vSphere Big Data Extensions
---------------------------
Downloads:
https://my.vmware.com/group/vmware/details?downloadGroup=BDE_200_GA&product
Id=353&rPId=6657
Documentation and Release Notes:
http://kb.vmware.com/kb/2091050
https://www.vmware.com/support/bigdataextensions/doc/vsphere-big-data-exten
sions-20-release-notes.html#resolvedissues
https://www.vmware.com/support/bigdataextensions/doc/vsphere-big-data-exten
sions-11-release-notes.html#resolvedissues
https://www.vmware.com/support/bigdataextensions/doc/vsphere-big-data-exten
sions-10-release-notes.html#resolvedissues
vSphere Data Protection
-----------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=VDP58_0&productId=35
3&rPId=6654
https://my.vmware.com/web/vmware/details?productId=353&rPId=6654&downloadGr
oup=VDP55_6
Documentation:
http://kb.vmware.com/kb/2091341
vSphere Management Assistant
----------------------------
Downloads:
Download available via online vMA update mechanism
Documentation:
http://kb.vmware.com/kb/2079150
http://kb.vmware.com/kb/2079151
vSphere Replication
-------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=VR5801&productId=353
&rPId=6654
https://my.vmware.com/web/vmware/get-download?downloadGroup=VR5602
https://my.vmware.com/web/vmware/details?productId=353&rPId=5721&downloadGr
oup=VR5513
https://my.vmware.com/web/vmware/details?downloadGroup=VR5122&productId=285
&rPId=6779
Documentation:
http://kb.vmware.com/kb/2091019
http://kb.vmware.com/kb/2091031
http://kb.vmware.com/kb/2091033
http://kb.vmware.com/kb/2091035
vSphere Storage Appliance
-------------------------
Downloads:
https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc
tId=354&rPId=6585
https://my.vmware.com/web/vmware/details?downloadGroup=VSP51-VSA-513&produc
tId=297&rPId=3752
Documentation:
http://kb.vmware.com/kb/2091000
http://kb.vmware.com/kb/2091086
5. References
VMware Knowledge Base Article 2090740
http://kb.vmware.com/kb/2090740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 ,
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278
- ------------------------------------------------------------------------
6. Change Log
2014-09-30 VMSA-2014-0010
Initial security advisory in conjunction with the release of
vCenter Log Insight 2.0 U1 on 2014-09-30.
2014-10-01 VMSA-2014-0010.1
Updated advisory in conjunction with the release of ESX 4.x patches,
vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director
Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway
5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added
CVE-2014-6277 and CVE-2014-6278 as they have been confirmed to be
mitigated.
2014-10-01 VMSA-2014-0010.2
Updated advisory in conjunction with the release of Horizon Workspace
patches, IT Business Management Suite 1.1.0 and 1.0.1, vCenter
Operations Manager patches, vCenter Site Recovery Manager 5.5.1.3 and
5.1.2.2, vCloud Application Director patches, vCloud Automation Center
patches, vCloud Automation Center Application Services patches, vCloud
Director Appliance 5.5.1.3, vFabric Postgres 9.3.5.1, 9.2.9.1, and
9.1.14.1, vSphere Replication 5.8.0.1, 5.5.1.3, and 5.1.2.2 on
2014-10-01.
2014-10-02 VMSA-2014-0010.3
Updated advisory in conjunction with the release of vCenter Hyperic
Server 5.8.3, 5.7.2, and 5.0.3, vCenter Infrastructure Navigator 5.8.3,
5.7.1, and 2.0.1 vCenter Orchestrator Appliance patches, vCenter Support
Assistant patches, vSphere App HA 1.1.1, vSphere Management Assistant
5.5 EP1 and 5.0 EP1 and vSphere Storage Appliance patches on 2014-10-02.
2014-10-02 VMSA-2014-0010.4
Updated advisory in conjunction with the release of Horizon DaaS
Platform 6.1.1, 6.0.2, and 5.4.3, vCenter Orchestrator Appliance
5.5.2.1,
vCloud Connector 2.6.1, vCloud Usage Meter 3.3.2, and vSphere
Replication 5.6.0.2 on 2014-10-02.
2014-10-03 VMSA-2014-0010.5
Updated advisory in conjunction with the release of vCloud Networking
and Security 5.5.3.1 and 5.1.4.3 on 2014-10-03.
2014-10-04 VMSA-2014-0010.6
Updated advisory in conjunction with the release of NSX for
Multi-Hypervisor 4.2.1, 4.1.4, and 4.0.5, NSX for vSphere 6.1.1 and
6.0.7,
NVP 3.2.4, and vSphere Big Data Extensions 2.x patch on 2014-10-04.
2014-10-05 VMSA-2014-0010.7
Updated advisory in conjunction with the release of View Planner
Benchmark
3.0.1.1 and vSphere Data Protection 5.x patch on 2014-10-05.
2014-10-06 VMSA-2014-0010.8
Updated advisory in conjunction with the release of vCenter Hyperic
Server
5.8.2 SP3, 5.8.1 SP3, 5.8.0 SP2, 5.7.1 SP1, and 5.0.2 SP1, vCenter Log
Insight 1.5.0U1, View Planner Flexible 3.0.1.1,VMware Application
Dependency
Planner 2.0.0.1, VMware HealthAnalyzer 5.0.3.1, vSphere App HA 1.1.0
patch
on 2014-10-06.
- ------------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Policy
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC
Copyright 2014 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8
wj8DBQFUMxZ4DEcm8Vbi9kMRAurPAJ9Grayh6jV8aaAQ/oUB92eF2UmJKgCgh9td
9QOr9abWJHNuF+qn1gWiXJE=
=EOGQ
-----END PGP SIGNATURE-----
Category Archives: Security
Security
Yahoo Confirms Infected Servers Unrelated to Shellshock
Yahoo CISO Alex Stamos confirmed that three servers had been infected with malware by hackers looking for machines vulnerable to Shellshock.
VIGOR 2130 Command Injection / Cross Site Request Forgery
VIGOR 2130 suffers from command injection and cross site request forgery vulnerabilities.
Mandos Encrypted File System Unattended Reboot Utility 1.6.9
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
CEBA-2014:1360 CentOS 7 systemtap BugFix Update
CentOS Errata and Bugfix Advisory 2014:1360 Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1360.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 752157afa4eaf26f375d0770eae0e64459a5ee65099ffd6637dd8f7a0fe0f314 systemtap-2.4-16.el7_0.x86_64.rpm 32ce393a347a22f77ab9f4104b3563d28b14410024fade48f8bad3cf742d3cbb systemtap-client-2.4-16.el7_0.x86_64.rpm 94bb463a14126080683814c00190fa58d3b97923d2c395e7b2bd17058f8d01ae systemtap-devel-2.4-16.el7_0.x86_64.rpm 64a63341f56beb92b2ff6955ad83b7b1e2d4cb13cc2f50fb5d41f09c1330390b systemtap-initscript-2.4-16.el7_0.x86_64.rpm f02d27d862fd7ccfd96f2072ca040bb2b53c9c6a2100877b62fbc464b430cca9 systemtap-runtime-2.4-16.el7_0.x86_64.rpm 692dc87534413f72404a1ada020c9bdc5871fc6f16a0c3a1b9c73be6ed307b9e systemtap-runtime-java-2.4-16.el7_0.x86_64.rpm 3974c52c4a7afdf927671bc6c2b48f68e1516ab9ceb736d476613adfa9416b9f systemtap-runtime-virtguest-2.4-16.el7_0.x86_64.rpm d265dd81b67777a388167491163eda8b8221b0db43209f9d2d8c308648a9594d systemtap-runtime-virthost-2.4-16.el7_0.x86_64.rpm 385003dcd54c036979dd21582972b7505b6cb96b1bf6dd04f8b96eb76bf59492 systemtap-sdt-devel-2.4-16.el7_0.i686.rpm 44e0cc71c7c51cdae03cc62266aa9c0d3416d8fc5dc8597672e19b0b6284f336 systemtap-sdt-devel-2.4-16.el7_0.x86_64.rpm 846266d46bc5905daa68acbcfc35371a1c57574592abcd37ad74ac59de17b23d systemtap-server-2.4-16.el7_0.x86_64.rpm 80b78c7c075ca8ed1624704fc418a2e316eb03283a6b3300aed3df160917b1ec systemtap-testsuite-2.4-16.el7_0.x86_64.rpm Source: 50dda4d433a7a80f4e1f49788a7fc221937aba4029b2f62d52e1c19d8ca8cbb5 systemtap-2.4-16.el7_0.src.rpm
CEBA-2014:1361 CentOS 7 ethtool BugFix Update
CentOS Errata and Bugfix Advisory 2014:1361 Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1361.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: f7206ad3f099f7f3a889e60181de07f22f5a887c58915addb96286b358879dad ethtool-3.8-4.el7_0.x86_64.rpm Source: 249bf779e0cc6dd9ccbbb33b41d781b3437e23dac7d8f2b2e7018fdc803d652f ethtool-3.8-4.el7_0.src.rpm
Apache mod_cgi Remote Command Execution
Apache mod_cgi remote command execution exploit that leverages shellshock.
Postfix SMTP Shellshock
Postfix SMTP with procmail shellshock exploit that affects versions 4.2.x up through 4.2.48.
Red Hat Security Advisory 2014-1359-01
Red Hat Security Advisory 2014-1359-01 – Polkit-qt is a library that lets developers use the PolicyKit API through a Qt-styled API. The polkit-qt library is used by the KDE Authentication Agent, which is a part of kdelibs. It was found that polkit-qt handled authorization requests with PolicyKit via a D-Bus API that is vulnerable to a race condition. A local user could use this flaw to bypass intended PolicyKit authorizations. This update modifies polkit-qt to communicate with PolicyKit via a different API that is not vulnerable to the race condition. All polkit-qt users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
CESA-2014:1359 Important CentOS 7 polkit-qtSecurity Update
CentOS Errata and Security Advisory 2014:1359 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1359.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 469ec506f78304c51f385b054029bc165b4027ca1721f73667ee9151cb89b2a6 polkit-qt-0.103.0-10.el7_0.i686.rpm c3403ffee586868bc003f85982553a1bc2860caab13339f53454e63e063dea09 polkit-qt-0.103.0-10.el7_0.x86_64.rpm 266e739f8d9d4811ceb304258dc103d759f8d0d3f5518589d14e0aa32bbd8255 polkit-qt-devel-0.103.0-10.el7_0.i686.rpm 5a6972e28e0df36c6a9088179f9cee3d036ba93987d06ab0643e1d4487304ae4 polkit-qt-devel-0.103.0-10.el7_0.x86_64.rpm 5ed37c9af4c75e28771e5fdb0b4e12ccbaaefc95ecbd87decb70a91a5c13f61e polkit-qt-doc-0.103.0-10.el7_0.noarch.rpm Source: 5ba465a8aeb2c20476d58143742fbfc7510647780340a19d4ecdd77a601ef288 polkit-qt-0.103.0-10.el7_0.src.rpm