lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 04 Jun 2008 10:13:35 -0700
From: VMware Security team <security@...are.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: VMSA-2008-0009 Updates to VMware Workstation,
 VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API,
 VMware ESX, VMware ESXi resolve critical security issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2008-0009
Synopsis:          Updates to VMware Workstation, VMware Player,
                   VMware ACE, VMware Fusion, VMware Server, VMware
                   VIX API, VMware ESX, VMware ESXi resolve critical
                   security issues
Issue date:        2008-06-04
Updated on:        2008-06-04 (initial release of advisory)
CVE numbers:       CVE-2007-5671 CVE-2008-0967 CVE-2008-2097
                   CVE-2008-2100 CVE-2006-1721 CVE-2008-0553
                   CVE-2007-5378 CVE-2007-4772 CVE-2008-0888
                   CVE-2008-0062 CVE-2008-0063 CVE-2008-0948
- -------------------------------------------------------------------

1. Summary:

   Several critical security vulnerabilities have been addressed
   in patches in ESX and in the newest releases of VMware's hosted
   product line.

2. Relevant releases:

   VMware Workstation 6.0.3 and earlier,
   VMware Workstation 5.5.6 and earlier,
   VMware Player 2.0.3 and earlier,
   VMware Player 1.0.6 and earlier,
   VMware ACE 2.0.3 and earlier,
   VMware ACE 1.0.5 and earlier,
   VMware Server 1.0.5 and earlier,
   VMware Fusion 1.1.1 and earlier

   VMware ESXi 3.5  without patches ESXe350-200805501-I-SG,
                                    ESXe350-200805502-T-SG,
                                    ESXe350-200805503-C-SG

   VMware ESX 3.5   without patches ESX350-200805515-SG, ESX350-200805508-SG,
                                    ESX350-200805501-BG, ESX350-200805504-SG,
                                    ESX350-200805506-SG, ESX350-200805505-SG,
                                    ESX350-200805507-SG

   VMware ESX 3.0.2 without patches ESX-1004727, ESX-1004821, ESX-1004216,
                                    ESX-1004726, ESX-1004722, ESX-1004724,
                                    ESX-1004719, ESX-1004219

   VMware ESX 3.0.1 without patches ESX-1004186, ESX-1004728, ESX-1004725,
                                    ESX-1004721, ESX-1004723, ESX-1004190,
                                    ESX-1004189

   VMware ESX 2.5.5 without update patch 8
   VMware ESX 2.5.4 without update patch 19

NOTES: Hosted products VMware Workstation 5.x, VMware Player 1.x,
       and VMware ACE 1.x will reach end of general support
       2008-11-09. Customers should plan to upgrade to the latest
       version of their respective products.

       ESX 3.0.1 is in Extended Support and its end of extended
       support (Security and Bug fixes) is 2008-07-31. Users should plan
       to upgrade to at least 3.0.2 update 1 and preferably the newest
       release available before the end of extended support.

       ESX 2.5.4 is in Extended Support and its end of extended support
       (Security and Bug fixes) is 2008-10-08.  Users should plan to upgrade
       to at least 2.5.5 and preferably the newest release available before
       the end of extended support.

3. Problem description:

 a. VMware Tools Local Privilege Escalation on Windows-based guest OS

    The VMware Tools Package provides support required for shared folders
    (HGFS) and other features.

    An input validation error is present in the Windows-based VMware
    HGFS.sys driver.   Exploitation of this flaw might result in
    arbitrary code execution on the guest system by an unprivileged
    guest user.  It doesn't matter on what host the Windows guest OS
    is running, as this is a guest driver vulnerability and not a
    vulnerability on the host.

    The HGFS.sys driver is present in the guest operating system if the
    VMware Tools package is loaded.  Even if the host has HGFS disabled
    and has no shared folders, Windows-based guests may be affected. This
    is regardless if a host supports HGFS.

    This issue could be mitigated by removing the VMware Tools package
    from Windows based guests.  However this is not recommended as it
    would impact usability of the product.

    NOTE: Installing the new hosted release or ESX patches will not
          remediate the issue.  The VMware Tools packages will need
          to be updated on each Windows-based guest followed by a
          reboot of the guest system.

    VMware would like to thank iDefense and Stephen Fewer of Harmony
    Security for reporting this issue to us.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2007-5671 to this issue.

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    Workstation   6.x       Windows  not affected
    Workstation   6.x       Linux    not affected
    Workstation   5.x       Windows  5.5.6 build 80404 or later
    Workstation   5.x       Linux    5.5.6 build 80404 or later

    Player        2.x       Windows  not affected
    Player        2.x       Linux    not affected
    Player        1.x       Windows  1.0.6 build 80404 or later
    Player        1.x       Linux    1.0.6 build 80404 or later

    ACE           2.x       Windows  not affected
    ACE           1.x       Windows  1.0.5 build 79846 or later

    Server        1.x       Windows  1.0.5 build 80187 or later
    Server        1.x       Linux    1.0.5 build 80187 or later

    Fusion        1.x       Mac OS/X not affected

    ESXi          3.5       ESXi     not affected

    ESX           3.5       ESX      not affected
    ESX           3.0.2     ESX      ESX-1004727
    ESX           3.0.1     ESX      ESX-1004186
    ESX           2.5.5     ESX      ESX 2.5.5 upgrade patch 5 or later
    ESX           2.5.4     ESX      ESX 2.5.4 upgrade patch 16 or later


 b. Privilege escalation on ESX or Linux based hosted operating systems

    This update fixes a security issue related to local exploitation of
    an untrusted library path vulnerability in vmware-authd. In order to
    exploit this vulnerability, an attacker must have local access and
    the ability to execute the set-uid vmware-authd binary on an affected
    system. Exploitation of this flaw might result in arbitrary code
    execution on the Linux host system by an unprivileged user.

    VMware would like to thank iDefense for reporting this issue to us.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-0967 to this issue.

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    Workstation   6.x       Windows  not affected
    Workstation   6.x       Linux    6.0.4 build 93057
    Workstation   5.x       Windows  not affected
    Workstation   5.x       Linux    5.5.7 build 91707

    Player        2.x       Windows  not affected
    Player        2.x       Linux    2.0.4 build 93057
    Player        1.x       Windows  not affected
    Player        1.x       Linux    1.0.7 build 91707

    ACE           2.x       Windows  not affected
    ACE           1.x       Windows  not affected

    Server        1.x       Windows  not affected
    Server        1.x       Linux    1.0.6 build 91891

    Fusion        1.x       Mac OS/X not affected

    ESXi          3.5       ESXi     ESXe350-200805501-I-SG

    ESX           3.5       ESX      ESX350-200805515-SG
    ESX           3.0.2     ESX      ESX-1004821
    ESX           3.0.1     ESX      ESX-1004728
    ESX           2.5.5     ESX      ESX 2.5.5 update patch 8
    ESX           2.5.4     ESX      ESX 2.5.4 update patch 19

 c. Openwsman Invalid Content-Length Vulnerability

    Openwsman is a system management platform that implements the Web
    Services Management protocol (WS-Management). It is installed and
    running by default. It is used in the VMware Management Service
    Console and in ESXi.

    The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
    to a privilege escalation vulnerability, which may allow users with
    non-privileged ESX or Virtual Center accounts to gain root privileges.

    To exploit this vulnerability, an attacker would need a local ESX
    account or a VirtualCenter account with the Host.Cim.CimInteraction
    permission.

    Systems with no local ESX accounts and no VirtualCenter accounts with
    the Host.Cim.CimInteraction permission are not vulnerable.

    This vulnerability cannot be exploited by users without valid login
    credentials.

    Discovery: Alexander Sotirov, VMware Security Research

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-2097 to this issue.

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    hosted        any       any      not affected

    ESXi          3.5       ESXi     ESXe350-200805501-I-SG

    ESX           3.5       ESX      ESX350-200805508-SG
    ESX           3.0.2     ESX      not affected
    ESX           3.0.1     ESX      not affected
    ESX           2.5.5     ESX      not affected
    ESX           2.5.4     ESX      not affected

    NOTE: VMware hosted products are not affected by this issue.

 d. VMware VIX Application Programming Interface (API) Memory Overflow
Vulnerabilities

    The VIX API (also known as "Vix") is an API that lets users write scripts
    and programs to manipulate virtual machines.

    Multiple buffer overflow vulnerabilities are present in the VIX API.
    Exploitation of these vulnerabilities might result in code execution on
    the host system or on the service console in ESX Server from the guest
    operating system.

    The VIX API can be enabled and disabled using the "vix.inGuest.enable"
    setting in the VMware configuration file. This default value for this
    setting is "disabled".  This configuration setting is present in the
    following products:
      VMware Workstation 6.0.2 and higher
      VMware ACE 6.0.2 and higher
      VMware Server 1.06 and higher
      VMware Fusion 1.1.2 and higher
      ESX Server 3.0 and higher
      ESX Server 3.5 and higher
    In previous versions of VMware products where the VIX API was introduced,
    the VIX API couldn't be disabled.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-2100 to this issue.

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    VIX API       1.1.x     Windows  VMware-vix-1.1.4-93057.exe
    VIX API       1.1.x     Linux    VMware-vix-1.1.4-93057.i386.tar.gz
    VIX API       1.1.x     Linux64  VMware-vix-1.1.4-93057.x86_64.tar.gz

    Workstation   6.x       Windows  6.0.4 build 93057
    Workstation   6.x       Linux    6.0.4 build 93057
    Workstation   5.x       Windows  5.5.7 build 91707
    Workstation   5.x       Linux    5.5.7 build 91707

    Player        2.x       Windows  2.0.4 build 93057
    Player        2.x       Linux    2.0.4 build 93057
    Player        1.x       Windows  1.0.6 build 91707
    Player        1.x       Linux    1.0.6 build 91707

    ACE           2.x       Windows  2.0.4 build 93057
    ACE           1.x       Windows  not affected

    Server        1.x       Windows  1.0.6 build 91891
    Server        1.x       Linux    1.0.6 build 91891

    Fusion        1.x       Mac OS/X 1.1.2 build 87978 or later

    ESXi          3.5       ESXi     ESXe350-200805501-I-SG,
                                     ESXe350-200805502-T-SG

    ESX           3.5       ESX      ESX350-200805501-BG
    ESX           3.0.2     ESX      ESX-1004216, ESX-1004726, ESX-1004727
    ESX           3.0.1     ESX      ESX-1004186, ESX-1004725
    ESX           2.5.5     ESX      not affected
    ESX           2.5.4     ESX      not affected


II Service Console rpm updates

  NOTE: ESXi and hosted products are not affected by any service console
        security updates

  a. Security update for cyrus-sasl

    Updated cyrus-sasl package for the ESX Service Console corrects a security
    issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
    implementation of Simple Authentication and Security Layer (SASL). As a
    result of this issue in the authentication mechanism, a remote
    unauthenticated attacker might be able to cause a denial of service error
    on the service console.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2006-1721 to this issue.

    RPMs Updated:
    cyrus-sasl-2.1.15-15.i386.rpm
    cyrus-sasl-md5-2.1.15-1.i386.rpm

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    hosted        any       any      not affected

    ESXi          3.5       ESXi     not affected

    ESX           3.5       ESX      ESX350-200805504-SG
    ESX           3.0.2     ESX      ESX-1004722
    ESX           3.0.1     ESX      ESX-1004721
    ESX           2.5.5     ESX      not affected
    ESX           2.5.4     ESX      not affected

  b. Security update for tcltk

    An input validation flaw was discovered in Tk's GIF image handling. A
    code-size value read from a GIF image was not properly validated before
    being used, leading to a buffer overflow. A specially crafted GIF file
    could use this to cause a crash or, potentially, execute code with the
    privileges of the application using the Tk graphical toolkit.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2008-0553 to this issue.

    A buffer overflow flaw was discovered in Tk's animated GIF image handling.
    An animated GIF containing an initial image smaller than subsequent images
    could cause a crash or, potentially, execute code with the privileges of
    the application using the Tk library.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2007-5378 to this issue.

    A flaw first discovered in the Tcl regular expression engine used in the
    PostgreSQL database server, resulted in an infinite loop when processing
    certain regular expressions.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2007-4772 to this issue.

    RPM Updated:
    tcl-8.3.5-92.8.i386.rpm

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    hosted        any       any      not affected

    ESXi          3.5       ESXi     not affected

    ESX           3.5       ESX      ESX350-200805506-SG
    ESX           3.0.2     ESX      ESX-1004724
    ESX           3.0.1     ESX      ESX-1004723
    ESX           2.5.5     ESX      ESX 2.5.5 Upgrade Patch 8
    ESX           2.5.4     ESX      ESX 2.5.4 Upgrade Patch 19

  c. Security update for unzip

    This patch includes a moderate security update to the service console that
    fixes a flaw in unzip. An attacker could execute malicious code with a
    user's privileges if the user ran unzip on a file designed to leverage
    this flaw.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CVE-2008-0888 to this issue.

    RPM Updated:
    Unzip-5.50-36.EL3.i386.rpm

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    hosted        any       any      not affected

    ESXi          3.5       ESXi     not affected

    ESX           3.5       ESX      ESX350-200805505-SG
    ESX           3.0.2     ESX      ESX-1004719
    ESX           3.0.1     ESX      ESX-1004190
    ESX           2.5.5     ESX      ESX 2.5.5 Upgrade Patch 8
    ESX           2.5.4     ESX      ESX 2.5.4 Upgrade Patch 19

  d. Security update for krb5

    KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable
    for some krb4 message types, which allows remote attackers to
    cause a denial of service (crash) and possibly execute arbitrary
    code via crafted messages that trigger a NULL pointer dereference
    or double-free.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-0062 to this issue.

    NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
          to this issue.

    The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not
    properly clear the unused portion of a buffer when generating an
    error message, which might allow remote attackers to obtain
    sensitive information, aka "Uninitialized stack values."

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-0063 to this issue.

    NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
          to this issue.

    Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used
    by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably
    other versions before 1.3, when running on systems whose unistd.h
    does not define the FD_SETSIZE macro, allows remote attackers to cause
    a denial of service (crash) and possibly execute arbitrary code by
    triggering a large number of open file descriptors.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2008-0948 to this issue.

    RPM Updated:
    krb5-libs-1.2.7-68.i386.rpm

    VMware        Product   Running  Replace with/
    Product       Version   on       Apply Patch
    ============  ========  =======  =================
    hosted        any       any      not affected

    ESXi          3.5       ESXi     not affected

    ESX           3.5       ESX      ESX350-200805507-SG
    ESX           3.0.2     ESX      ESX-1004219
    ESX           3.0.1     ESX      ESX-1004189
    ESX           2.5.5     ESX      ESX 2.5.5 Upgrade Patch 8
    ESX           2.5.4     ESX      ESX 2.5.4 Upgrade Patch 19

4. Solution:

Please review the release notes for your product and version and verify the
md5sum of your downloaded file.

  VMware Workstation 6.0.4
  ------------------------
  http://www.vmware.com/download/ws/
  Release notes:
  http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

  Windows binary
  md5sum: f50a05831e94c19d98f363c752fca5f9

  RPM Installation file for 32-bit Linux
  md5sum: e7793b14b995d3b505f093c84e849421

  tar Installation file for 32-bit Linux
  md5sum: a0a8e1d8188f4be03357872a57a767ab

  RPM Installation file for 64-bit Linux
  md5sum: 960d753038a268b8f101f4b853c0257e

  tar Installation file for 64-bit Linux
  md5sum: 4697ec8a9d6c1152d785f3b77db9d539

  VMware Workstation 5.5.7
  ------------------------
  http://www.vmware.com/download/ws/ws5.html
  Release notes:
  http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

  Windows binary:
  md5sum: 4c6a6653b7296240197aac048591c659

  Compressed Tar archive for 32-bit Linux
  md5sum: 8fc15d72031489cf5cd5d47b966787e6

  Linux RPM version for 32-bit Linux
  md5sum: f0872fe447ac654a583af16b2f4bba3f


  VMware Player 2.0.4 and 1.0.7
  -----------------------------
  http://www.vmware.com/download/player/
  Release notes Player 1.x:
  http://www.vmware.com/support/player/doc/releasenotes_player.html
  Release notes Player 2.0
  http://www.vmware.com/support/player2/doc/releasenotes_player2.html

  2.0.4 Windows binary
  md5sum: a117664a8bfa7336b846117e5fc048dd

  VMware Player 2.0.4 for Linux (.rpm)
  md5sum: de6ab6364a0966b68eadda2003561cd2

  VMware Player 2.0.4 for Linux (.tar)
  md5sum: 9e1c2bfda6b22a3fc195a86aec11903a

  VMware Player 2.0.4 - 64-bit (.rpm)
  md5sum: 997e5ceffe72f9ce9146071144dacafa

  VMware Player 2.0.4 - 64-bit (.tar)
  md5sum: 18eb4ee49dd7e33ec155ef69d7d259ef

  1.0.7 Windows binary
  md5sum: 51114b3b433dc1b3bf3e434aebbf2b9c

  Player 1.0.7 for Linux (.rpm)
  md5sum: 3b5f97a37df3b984297fa595a5cdba9c

  Player 1.0.7 for Linux (.tar)
  md5sum: b755739144944071492a16fa20f86a51


  VMware ACE
  ----------
  http://www.vmware.com/download/ace/
  Release notes 2.0:
  http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

  VMware-workstation-6.0.4-93057.exe
  md5sum: f50a05831e94c19d98f363c752fca5f9

  VMware-ACE-Management-Server-Appliance-2.0.4-93057.zip
  md5sum: d2ae2246f3d87268cf84c1421d94e86c

  VMware-ACE-Management-Server-2.0.4-93057.exe
  md5sum: 41b31b3392d5da2cef77a7bb28654dbf

  VMware-ACE-Management-Server-2.0.4-93057.i386-rhel4.rpm
  md5sum: 9920be4c33773df53a1728b41af4b109

  VMware-ACE-Management-Server-2.0.4-93057.i386-sles9.rpm
  md5sum: 4ec4c37203db863e8844460b5e80920b

  Release notes 1.x:
  http://www.vmware.com/support/ace/doc/releasenotes_ace.html

  VMware-ACE-1.0.6-89199.exe
  md5sum: 110f6e24842a0d154d9ec55ef9225f4f


  VMware Server 1.0.6
  -------------------
  http://www.vmware.com/download/server/
  Release notes:
  http://www.vmware.com/support/server/doc/releasenotes_server.html

  VMware Server for Windows 32-bit and 64-bit
  md5sum: 3e00d5cfae123d875e4298bddabf12f5

  VMware Server Windows client package
  md5sum: 64f3fc1b4520626ae465237d7ec4773e

  VMware Server for Linux
  md5sum: 46ea876bfb018edb6602a921f6597245

  VMware Server for Linux rpm
  md5sum: 9d2f0af908aba443ef80bec8f7ef3485

  Management Interface
  md5sum: 1b3daabbbb49a036fe49f53f812ef64b

  VMware Server Linux client package
  md5sum: 185e5b174659f366fcb38b1c4ad8d3c6


  VMware Fusion 1.1.3
  --------------
  http://www.vmware.com/download/fusion/
  Release notes:
  http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html
  md5sum: D15A3DFD3E7B11FC37AC684586086D


  VMware VIX 1.1.4
  ----------------
  http://www.vmware.com/support/developer/vix-api/
  Release notes:
  http://www.vmware.com/support/pubs/vix-api/VIXAPI-1.1.4-Release-Notes.html
  VMware-vix-1.1.4-93057.exe
  md5sum: 2efb74618c7ead627ecb3b3033e3f9f6

  VMware-vix-1.1.4-93057.i386.tar.gz
  md5sum: 988df2b2bbc975a6fc11f27ad1519832

  VMware-vix-1.1.4-93057.x86_64.tar.gz
  md5sum: a64f951c6fb5b2795a29a5a7607059c0


  ESXi
  ----
  VMware ESXi 3.5 patch ESXe350-200805501-O-SG (authd, openwsman, VIX)
  http://download3.vmware.com/software/esx/ESXe350-200805501-O-SG.zip
  md5sum: 4ce06985d520e94243db1e0504a56d8c
  http://kb.vmware.com/kb/1005073
  http://kb.vmware.com/kb/1004173
  http://kb.vmware.com/kb/1004172

  NOTE: ESXe350-200805501-O-SG contains the following patch bundles:
        ESXe350-200805501-I-SG, ESXe350-200805502-T-SG,
        ESXe350-200805503-C-SG


  ESX
  ---
  VMware ESX 3.5 patch ESX350-200805515-SG (authd)
  http://download3.vmware.com/software/esx/ESX350-200805515-SG.zip
  md5sum: 324b50ade230bcd5079a76e3636163c5
  http://kb.vmware.com/kb/1004170

  VMware ESX 3.5 patch ESX350-200805508-SG (openwsman)
  http://download3.vmware.com/software/esx/ESX350-200805508-SG.zip
  md5sum: 3ff8c06d4a9dd406f64f89c51bf26d12
  http://kb.vmware.com/kb/1004644

  VMware ESX 3.5 patch ESX350-200805501-BG (VIX)
  http://download3.vmware.com/software/esx/ESX350-200805501-BG.zip
  md5sum: 31a620aa249c593c30015b5b6f8c8650
  http://kb.vmware.com/kb/1004637

  VMware ESX 3.5 patch ESX350-200805504-SG (cyrus-sasl)
  http://download3.vmware.com/software/esx/ESX350-200805504-SG.zip
  md5sum: 4c1b1a8dcb09a636b55c64c290f7de51
  http://kb.vmware.com/kb/1004640

  VMware ESX 3.5 patch ESX350-200805506-SG (tcltk)
  http://download3.vmware.com/software/esx/ESX350-200805506-SG.zip
  md5sum: af279eef8fdeddb7808630da1ae717b1
  http://kb.vmware.com/kb/1004642

  VMware ESX 3.5 patch ESX350-200805505-SG (unzip)
  http://download3.vmware.com/software/esx/ESX350-200805505-SG.zip
  md5sum: 07af82d9fd97cccb89d9b90c6ecc41c6
  http://kb.vmware.com/kb/1004641

  VMware ESX 3.5 patch ESX350-200805507-SG (krb5)
  http://download3.vmware.com/software/esx/ESX350-200805507-SG.zip
  md5sum: 5d35a1c470daf13c9f4df5bdc9438748
  http://kb.vmware.com/kb/1004643

  VMware ESX 3.0.2 patch ESX-1004727 (HGFS,VIX)
  http://download3.vmware.com/software/vi/ESX-1004727.tgz
  md5sum: 31a67b0fa3449747887945f8d370f19e
  http://kb.vmware.com/kb/1004727

  VMware ESX 3.0.2 patch ESX-1004821 (authd)
  http://download3.vmware.com/software/vi/ESX-1004821.tgz
  md5sum: 5c147bedd07245c903d44257522aeba1
  http://kb.vmware.com/kb/1004821

  VMware ESX 3.0.2 patch ESX-1004216 (VIX)
  http://download3.vmware.com/software/vi/ESX-1004216.tgz
  md5sum: 0784ef70420d28a9a5d6113769f6669a
  http://kb.vmware.com/kb/1004216

  VMware ESX 3.0.2 patch ESX-1004726 (VIX)
  http://download3.vmware.com/software/vi/ESX-1004726.tgz
  md5sum: 44f03b274867b534cd274ccdf4630b86
  http://kb.vmware.com/kb/1004726

  VMware ESX 3.0.2 patch ESX-1004722 (cyrus-sasl)
  http://download3.vmware.com/software/vi/ESX-1004722.tgz
  md5sum: 99dc71aed5bab7711f573b6d322123d6
  http://kb.vmware.com/kb/1004722

  VMware ESX 3.0.2 patch ESX-1004724 (tcltk)
  http://download3.vmware.com/software/vi/ESX-1004724.tgz
  md5sum: fd9a160ca7baa5fc443f2adc8120ecf7
  http://kb.vmware.com/kb/1004724

  VMware ESX 3.0.2 patch ESX-1004719 (unzip)
  http://download3.vmware.com/software/vi/ESX-1004719.tgz
  md5sum: f0c37b9f6be3399536d60f6c6944de82
  http://kb.vmware.com/kb/1004719

  VMware ESX 3.0.2 patch ESX-1004219 (krb5)
  http://download3.vmware.com/software/vi/ESX-1004219.tgz
  md5sum: 7c68279762f407a7a5ee151a650ebfd4
  http://kb.vmware.com/kb/1004219

  VMware ESX 3.0.1 patch ESX-1004186 (HGFS,VIX)
  http://download3.vmware.com/software/vi/ESX-1004186.tgz
  md5sum: f64389a8b97718eccefadce1a14d1198
  http://kb.vmware.com/kb/1004186

  VMware ESX 3.0.1 patch ESX-1004728 (authd)
  http://download3.vmware.com/software/vi/ESX-1004728.tgz
  md5sum: 1f01bb819805b855ffa2ec1040eff5ca
  http://kb.vmware.com/kb/1004728

  VMware ESX 3.0.1 patch ESX-1004725 (VIX)
  http://download3.vmware.com/software/vi/ESX-1004725.tgz
  md5sum: 9fafb04c6d3f6959e623832f539d2dc8
  http://kb.vmware.com/kb/1004725

  VMware ESX 3.0.1 patch ESX-1004721 (cyrus-sasl)
  http://download3.vmware.com/software/vi/ESX-1004721.tgz
  md5sum: 48190819b0f5afddefcb8d209d12b585
  http://kb.vmware.com/kb/1004721

  VMware ESX 3.0.1 patch ESX-1004723 (tcltk)
  http://download3.vmware.com/software/vi/ESX-1004723.tgz
  md5sum: c34ca0a5886e0c0917a93a97c331fd7d
  http://kb.vmware.com/kb/1004723

  VMware ESX 3.0.1 patch ESX-1004190 (unzip)
  http://download3.vmware.com/software/vi/ESX-1004190.tgz
  md5sum: 05187b9f534048c79c62741367cc0dd2
  http://kb.vmware.com/kb/1004190

  VMware ESX 3.0.1 patch ESX-1004189 (krb5)
  http://download3.vmware.com/software/vi/ESX-1004189.tgz
  md5sum: 21b620530b99009f469c872e73a439e8
  http://kb.vmware.com/kb/1004189

  VMware ESX 2.5.5 Upgrade Patch 8
  http://download3.vmware.com/software/esx/esx-2.5.5-90521-upgrade.tar.gz
  md5sum: 392b6947fc3600ca0e8e7788cd5bbb6e
  http://vmware.com/support/esx25/doc/esx-255-200805-patch.html

  VMware ESX 2.5.4 Upgrade Patch 19
  http://download3.vmware.com/software/esx/esx-2.5.4-90520-upgrade.tar.gz
  md5sum: 442788fd0bccb0d994c75b268bd12760
  http://vmware.com/support/esx25/doc/esx-254-200805-patch.html

5. References:

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5671
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0967
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2097
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2100
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5378
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948

6. Change log:

2008-06-04  VMSA-2008-0009    Initial release

- -------------------------------------------------------------------
7. Contact:

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce@...ts.vmware.com
  * bugtraq@...urityfocus.com
  * full-disclosure@...ts.grok.org.uk

E-mail:  security@...are.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2008 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFIRs08S2KysvBH1xkRCMxFAJ0WJX76quFzCV+avwupq3Lu72UKigCfRftj
CZvxoXw/sZxDCSDjVzYAhrA=
=s04s
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ