lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A9CB1E8.1040309@vmware.com>
Date: Mon, 31 Aug 2009 22:32:24 -0700
From: VMware Security team <security@...are.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: VMSA-2009-0011 VMware Studio 2.0 addresses a
 security issue in the public beta version of Studio 2.0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2009-0011
Synopsis:          VMware Studio 2.0 addresses a security issue in the
                   public beta version of Studio 2.0
Issue date:        2009-08-31
Updated on:        2009-08-31 (initial release of advisory)
CVE numbers:       CVE-2009-2968
- ------------------------------------------------------------------------

1. Summary

   VMware Studio 2.0 resolves a directory traversal vulnerability that
   was present in the VMware Studio 2.0 public beta.

2. Relevant releases

   VMware VMware Studio 2.0 public beta

3. Problem Description

 a. Directory traversal vulnerability

    Due to incomplete sanitation of user input, a support component of
    VMware Studio's web interface can be tricked into uploading a file
    to any directory inside the VMware Studio virtual appliance.  This
    issue does not affect virtual machines that are created with Studio
    2.0 beta.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2009-2968 to this issue.

    VMware would like to thank Claudio Criscione of Secure Network
    for reporting this issue to us.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  =================
    VMware Studio  1.0       VMware   not affected
    VMware Studio  2.0 beta  VMware   VMware Studio 2.0 build 1017-185256
    VMware Studio  2.0       VMware   not affected

4. Solution

   Please review the patch/release notes for your product and version
   and verify the sha1sum and/or the md5sum of your downloaded file.

   VMware Studio 2.0 build 1017-185256
   -----------------------------------
   http://www.vmware.com/support/developer/studio/
   Release notes:
http://www.vmware.com/support/developer/studio/studio20/release_notes.html

   VMware Studio appliance in ZIP
    (md5sum:58cb40704d12f4ec329b887ae729aba9)
    (sha1sum:2931a6a4de7e77016d08c6539cab93a6304ab452)

   VMware Studio appliance in OVA
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ova
    (md5sum:0b0edb02865ae935bcffcccbf346adc2)
    (sha1sum:f126339ab0de5b684e60ab7dfd50ddb15f2391cc)

   VMware Studio appliance in OVF 1.0
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ovf
    (md5sum:a3dfca29578a75b0440be3419396c85c)
    (sha1sum:67f08e73de18ddeea257fefe6475f289d643ad77)

   VMware Studio appliance in OVF 0.9
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF09.ovf
    (md5sum:959c61270dc872be2f5e65e59480852d)
    (sha1sum:ac3c2d612f0b877f10ca607467b6a95b31ed3dd7)

   VMDK associated to the OVF 1.0 and OVF 0.9 descriptor
    (md5sum:617ec59063d2ba180b19f680fb1b49b1)
    (sha1sum:eb1d474cde175a9e042c9613eae31822843394cf)

   VMware Studio Plugin for Eclipse in ZIP
    (md5sum:9970df718f08f92c053758187c979293)
    (sha1sum:2d5a9a8d3d68faa3afd317b148f060a74cbd359a)


5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2968

- ------------------------------------------------------------------------
6. Change log

2009-08-31  VMSA-2009-0011
Initial security advisory after release of Studio 2.0 on 2009-08-31.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2009 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iD8DBQFKnLHmS2KysvBH1xkRAlUSAJ90vZzWYrMUgNwmnk1EWRTEyF+pKgCffeLt
sMSBGdvumE+14/pi4woV46Q=
=jbNX
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ