lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4FD97033.806@vmware.com>
Date: Wed, 13 Jun 2012 22:01:39 -0700
From: VMware Security Team <security@...are.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: VMSA-2012-0011 VMware hosted products and ESXi and ESX patches address
 security issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 -----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2012-0011
Synopsis:    VMware hosted products and ESXi and ESX patches address
             security issues
Issue date:  2012-06-14
Updated on:  2012-06-14 (initial advisory)
CVE numbers: CVE-2012-3288, CVE-2012-3289
 -----------------------------------------------------------------------
1. Summary

   VMware Workstation, Player, Fusion, ESXi and ESX patches address
   security issues.

2. Relevant releases

   Workstation 8.0.3
   Workstation 7.1.5

   Player 4.0.3
   Player 3.1.5

   Fusion 4.1.2
   
   ESXi 5.0 without patch ESXi500-201206401-SG
   ESXi 4.1 without patch ESXi410-201206401-SG
   ESXi 4.0 without patch ESXi400-201206401-SG
   ESXi 3.5 without patch ESXe350-201206401-I-SG

   ESX 4.1 without patch ESX410-201206401-SG
   ESX 4.0 without patch ESX400-201206401-SG
   ESX 3.5 without patch ESX350-201206401-SG

3. Problem Description

 a. VMware Host Checkpoint file memory corruption

    Input data is not properly validated when loading Checkpoint files.
    This may allow an attacker with the ability to load a specially
    crafted Checkpoint file to execute arbitrary code on the host.

    Workaround
    - None identified

    Mitigation
    - Do not import virtual machines from untrusted sources.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2012-3288 to this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    Workstation    8.x       any      8.0.4 or later
    Workstation    7.x       any      7.1.6 or later

    Player         4.x       any      4.0.4 or later
    Player         3.x       any      3.1.6 or later

    Fusion         4.x       Mac OS/X 4.1.3 or later

    ESXi           5.0       ESXi     ESXi500-201206401-SG
    ESXi           4.1       ESXi     ESXi410-201206401-SG
    ESXi           4.0       ESXi     ESXi400-201206401-SG
    ESXi           3.5       ESXi     ESXe350-201206401-I-SG

    ESX            4.1       ESX      ESX410-201206401-SG
    ESX            4.0       ESX      ESX400-201206401-SG
    ESX            3.5       ESX      ESX350-201206401-SG

 b. VMware Virtual Machine Remote Device Denial of Service

    A device (e.g. CD-ROM, keyboard) that is available to a virtual
    machine while physically connected to a system that does not run the
    virtual machine is referred to as a remote device.

    Traffic coming from remote virtual devices is incorrectly handled.
    This may allow an attacker who is capable of manipulating the
    traffic from a remote virtual device to crash the virtual machine.

    Workaround
    - None identified

    Mitigation
    - Users need administrative privileges on the virtual machine
      in order to attach remote devices.
    - Do not attach untrusted remote devices to a virtual machine.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2012-3289 to this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    vCenter        any       Windows  not affected

    Workstation    8.x       any      8.0.4 or later
    Workstation    7.x       any      not affected

    Player         4.x       any      4.0.4 or later
    Player         3.x       any      not affected

    Fusion         4.x       Mac OS/X not affected

    ESXi           5.0       ESXi     ESXi500-201206401-SG
    ESXi           4.1       ESXi     ESXi410-201206401-SG
    ESXi           4.0       ESXi     ESXi400-201206401-SG
    ESXi           3.5       ESXi     ESXe350-201206401-I-SG

    ESX            4.1       ESX      ESX410-201206401-SG
    ESX            4.0       ESX      ESX400-201206401-SG
    ESX            3.5       ESX      ESX350-201206401-SG


4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   Workstation 8.0.4
   -----------------
   http://www.vmware.com/go/downloadworkstation

   Release notes:
 
https://www.vmware.com/support/ws80/doc/releasenotes_workstation_804.html

   VMware Workstation for Windows 32-bit and 64-bit with VMware Tools
   md5sum: 9c74d5468d693714d2b6c616fd416e54
   sha1sum: d542e1ac1a4df062ed6029fabf5f30750234a3b9

   VMware Workstation for Linux 32-bit with VMware Tools
   md5sum: 1c340ba2cef564fd52460cee46bfaa06
   sha1sum: 8d99595b5f7f020e51aad8ba373b0f09e8d0aba2

   VMware Workstation for Linux 64-bit with VMware Tools
   md5sum: de0ea94362f9c044bb4a03682dee2d05
   sha1sum: 04aa91f0bb4f51b024ed88939ecd9bb6d7efefe4

   Workstation 7.1.6
   -----------------
   http://www.vmware.com/go/downloadworkstation

   Release notes:
   https://www.vmware.com/support/ws71/doc/releasenotes_ws716.html

   VMware Workstation for Windows 32-bit and 64-bit with VMware Tools
   md5sum: f7856421babd716dace2f0250ae271f7
   sha1sum: 9eaf4b17afec36b8a166bad81be851bd8cfda709

   VMware Workstation for Linux 32-bit with VMware Tools
   md5sum: 18cc162a88d66a78a0114550517cd42d
   sha1sum: 5a1ea9c841a2f45c2e2ed07a30b01c18c85f2133

   VMware Workstation for Linux 64-bit with VMware Tools
   md5sum: c11e4e162fc128cbfe629c8fb60ea733
   sha1sum: 627698ac32d039bcafc117f0fb71d7e666ac0c2e
      
   Player 4.0.4
   ------------
   http://www.vmware.com/go/downloadplayer

   Release notes:
   https://www.vmware.com/support/player40/doc/releasenotes_player404.html

   VMware Player for Windows 32-bit and 64-bit
   md5sum: 9fea9628b54bba02c173b8dae2e0e77e
   sha1sum: 9dea11046392555cd6b00c8eb7b4135c3ca143b7

   VMware Player for Linux 32-bit
   md5sum: 3f0aae6170e075ec7b042b931e97bdac
   sha1sum: 595f73ced1f8dc2804d89ebfee98edeb561ff94d

   VMware Player for Linux 64-bit
   md5sum: 825633b7031578203104081f1a132b09
   sha1sum: e6b5919a822bfc66bf2cc9a52e62532433014c80

   Player 3.1.6
   ------------
   http://www.vmware.com/go/downloadplayer

   Release notes:
   https://www.vmware.com/support/player31/doc/releasenotes_player316.html

   VMware Player for Windows 32-bit and 64-bit
   md5sum: 258ca5ac40efa389b0bb221191dbdd65
   sha1sum: 691beccb590b7bc34461f78946d752288f2ef4e7

   VMware Player for Linux 32-bit
   md5sum: 9ed2d89816523ba030f8877c3fb935b9
   sha1sum: a16a91dddb6081be314ef5d84708d37fabdd859c

   VMware Player for Linux 64-bit
   md5sum: d0715a06775c0f92b9d23e031e4af1c6
   sha1sum: 5033c1bfecb309b96399410e614c41452c49e8e8

   Fusion 4.1.3
   ------------
   http://www.vmware.com/go/downloadfusion

   Release Notes:
   http://www.vmware.com/support/fusion4/doc/releasenotes_fusion_413.html
   
   VMware Fusion (for Intel-based Macs)
   md5sum: 1581b2f1cc0e28f9980c48bab59072bd
   sha1sum: f2f58d0b3bfa405c4e6d9f61d51e0d689f8ed34c

   ESXi and ESX
   ------------
   http://downloads.vmware.com/go/selfsupport-download
    
   ESXi 5.0
   --------
   ESXi500-201206001
   md5sum: 41299e3e0798220372ecd2c334e109bc
   sha1sum: f4309df6f6a0c876f496b324b16ff911e7907a40
   http://kb.vmware.com/kb/2021031
   ESXi500-201206001 contains ESXi500-201206401-SG

   ESXi 4.1
   --------
   ESXi410-201206001
   md5sum: c0b4c3aad0b7c77b3a586b0806d8b44e
   sha1sum: f6dd511b1eb257efdadfc608a70c6f3cda4e4b4a
   http://kb.vmware.com/kb/2019243
   ESXi410-201206001 contains ESXi410-201206401-SG

   ESXi 4.0
   --------
   ESXi400-201206001
   md5sum: e24762b6fa13c725f1739a9cea437949
   sha1sum: 822582de9c3791c6face7ed0fc3d8dc2f29322c0
   http://kb.vmware.com/kb/2021027
   ESXi400-201206001 contains ESXi410-201206401-SG

   ESXi 3.5
   --------
   ESXe350-201206401-O-SG
   md5sum: f553524860896eb3f9095740fb48ae53
   sha1sum: 70ec5bd7bad523b84f635031c99dd48fa378254b
   http://kb.vmware.com/kb/2021018
   ESXe350-201206401-O-SG contains ESXe350-201206401-I-SG

   ESX 4.1
   -------
   ESX410-201206001
   md5sum: 532aa0474f36649a74921adf14c8739b
   sha1sum: 8baabd80dc27bb4e705df63683c0be3af0ac5431
   http://kb.vmware.com/kb/2019065
   ESX410-201206001 contains ESX410-201206401-SG

   ESX 4.0
   -------
   ESX400-201206001
   md5sum: ca60db82c5a3a5c6128f5805fa34f121
   sha1sum: ff5aa11d5d4e1f4788483c7e60cbd828a0d6f7c1
   http://kb.vmware.com/kb/2021025
   ESX400-201206001 contains ESX400-201206401-SG

   ESX 3.5
   -------
   ESX350-201206401-SG
   md5sum: 065f9e2c78fea243c640e9757743a2ab
   sha1sum: 2438decf074a270067f58837efda10670a8955aa
   http://kb.vmware.com/kb/2021017

      
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3288
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3289

 -----------------------------------------------------------------------

6. Change log

   2012-06-14 VMSA-2012-0011
   Initial security advisory in conjunction with the release of
   Workstation 7.1.6, Player 3.1.6, ACE 2.7.6, Workstation 8.0.4,
   Player 4.0.4, Fusion 4.1.3 and patches for ESXi and ESX 3.5,
   4.0, 4.1 and 5.0 on 2012-06-14

 -----------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2012 VMware Inc.  All rights reserved

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFP2W/0DEcm8Vbi9kMRApVwAKDnOjNBK4qIwLM+WR1HJhiYBn+GHwCgpJRN
MLNMgyRdkDcEo4eYgM1SEi8=
=SoME
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ