lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 19 Jul 2010 09:27:16 -0700
From: VMware Security Team <security@...are.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: VMSA-2010-0012 VMware vCenter Update Manager fix
 for Jetty Web server addresses important security vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2010-0012
Synopsis:          VMware vCenter Update Manager fix for Jetty Web
                   server addresses important security vulnerabilities
Issue date:        2010-07-19
Updated on:        2010-07-19 (initial release of advisory)
CVE numbers:       CVE-2009-1523 CVE-2009-1524
- ------------------------------------------------------------------------

1. Summary

    VMware vCenter Update Manager fix for Jetty Web server addresses
    important security vulnerabilities.

2. Relevant releases

    VMware vCenter Update Manager 1.0
    VMware vCenter Update Manager 4.0
    VMware vCenter Update Manager 4.1

3. Problem Description

 a. VMware vCenter Update Manager Jetty Web server vulnerabilities

    VMware vCenter Update Manager is an automated patch management
    solution for VMware ESX hosts and Microsoft virtual machines. Update
    Manager embeds the Jetty Web server which is a third party
    component.

    The default version of the Jetty Web server in Update Manager is
    version 6.1.6 for which the following relevant vulnerabilities are
    reported.

    A directory traversal vulnerability in Jetty allows for obtaining
    files from the system where Update Manager is installed by a remote,
    unauthenticated attacker. The attacker would need to be on the same
    network as the system where Update Manager is installed.

    A cross-site scripting vulnerability in Jetty allows for running
    JavaScript in the browser of the user who clicks a URL containing a
    malicious request to Update Manager. For an attack to be successful
    the attacker would need to lure the user into clicking the malicious
    URL.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2009-1523 and CVE-2009-1524 to these issues.

    VMware would like to thank Claudio Criscione of Secure Network for
    reporting these issues to us.

    Column 4 of the following table lists the action required to
    remediate the vulnerabilities in each release, if a solution is
    available.  

    VMware           Product  Running  Replace with/
    Product          Version  on       Apply Patch
    ==============   =======  =======  =================
    Update Manager       1.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.1  Windows  Update Manager fix for Jetty *

    * Refer to VMware Knowledge Base article 1023962

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   VMware vCenter Update Manager
   -----------------------------
   Update Manager fix for Jetty
   http://kb.vmware.com/kb/1023962   

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1523
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1524

- ------------------------------------------------------------------------
6. Change log

2010-07-19  VMSA-2010-0012
Initial security advisory after release of VMware vCenter Update Manager
security fix for the Jetty Web server on 2010-07-19.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2010 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFMRHzZS2KysvBH1xkRAmGOAJ9NP3RuHj2w4mwu3saJFdjce+PrqwCfXhLk
kQ3DQOJquo4Ymo7foPajEwY=
=iZyn
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ