lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 31 Oct 2003 18:58:59 -0000
From: VMware <vmware-security-alert@...are.com>
To: bugtraq@...urityfocus.com
Subject: VMware GSX Server and ESX Server OpenSSL vulnerability patches




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Description
- -----------

These VMware server products use a version of OpenSSL for securing remote 
management connections that has known vulnerabilities that can expose 
systems to denial of service attacks: 

 - VMware GSX Server 2.5.1 (for Windows and Linux systems) build 5336 and 
   earlier 
 - VMware ESX Server 2.0 build 5257 and earlier 
 - VMware ESX Server 1.5.2 (all versions) 


Details/Impact
- --------------

Certain ASN.1 encodings and tag values can cause stack corruption and out 
of bounds reads in OpenSSL that can be exploited in denial of service 
attacks. For details, see 

www.openssl.org/news/secadv_20030930.txt 
cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545 
cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543 
cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544 

VMware GSX Server 2.5.1 (for Windows and Linux systems) build 5336, 
VMware ESX Server 2.0 build 5257 and ESX Server 1.5.2 (all versions) 
install OpenSSL version 0.9.7b as part of the Management Interface, 
Remote Console, and Scripting API packages. OpenSSL version 0.9.7b is 
subject to the above vulnerabilities.


Resolutions
- -----------

VMware has made OpenSSL patches available to correct the reported 
vulnerabilities. These patches update GSX Server and ESX Server systems 
and remote console clients with OpenSSL version 0.9.7c.

VMware stongly urges GSX Server and ESX Server customers to apply the 
OpenSSL patches as soon as possible.  

GSX Server patch installation instructions are at:
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1164

ESX Server patch installation instructions are at:
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1167


- ------------------
This document is clear signed with PGP.  

VMware has the PGP public key available at

http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1039

Some mail programs cause changes to mail messages and content, which may result
in an indication that the PGP signature for this message is not valid.  This
may also occur if this message is forwarded through another email distribution
list that changes the "From" field.  Please try to save the message into a file
and then running PGP on it.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (MingW32)

iD8DBQE/oqbVLsZLrftG15MRAmQDAJwNXNs2ETQY6iKTF5rsm0WtvDq5AQCgsxhB
fy2fFZbfBWrOgS3LmMi5/gE=
=ived
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ