[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A9CB1E8.1040309@vmware.com>
Date: Mon, 31 Aug 2009 22:32:24 -0700
From: VMware Security team <security@...are.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: VMSA-2009-0011 VMware Studio 2.0 addresses a
security issue in the public beta version of Studio 2.0
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2009-0011
Synopsis: VMware Studio 2.0 addresses a security issue in the
public beta version of Studio 2.0
Issue date: 2009-08-31
Updated on: 2009-08-31 (initial release of advisory)
CVE numbers: CVE-2009-2968
- ------------------------------------------------------------------------
1. Summary
VMware Studio 2.0 resolves a directory traversal vulnerability that
was present in the VMware Studio 2.0 public beta.
2. Relevant releases
VMware VMware Studio 2.0 public beta
3. Problem Description
a. Directory traversal vulnerability
Due to incomplete sanitation of user input, a support component of
VMware Studio's web interface can be tricked into uploading a file
to any directory inside the VMware Studio virtual appliance. This
issue does not affect virtual machines that are created with Studio
2.0 beta.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2009-2968 to this issue.
VMware would like to thank Claudio Criscione of Secure Network
for reporting this issue to us.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VMware Studio 1.0 VMware not affected
VMware Studio 2.0 beta VMware VMware Studio 2.0 build 1017-185256
VMware Studio 2.0 VMware not affected
4. Solution
Please review the patch/release notes for your product and version
and verify the sha1sum and/or the md5sum of your downloaded file.
VMware Studio 2.0 build 1017-185256
-----------------------------------
http://www.vmware.com/support/developer/studio/
Release notes:
http://www.vmware.com/support/developer/studio/studio20/release_notes.html
VMware Studio appliance in ZIP
(md5sum:58cb40704d12f4ec329b887ae729aba9)
(sha1sum:2931a6a4de7e77016d08c6539cab93a6304ab452)
VMware Studio appliance in OVA
Deployment URL:
http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ova
(md5sum:0b0edb02865ae935bcffcccbf346adc2)
(sha1sum:f126339ab0de5b684e60ab7dfd50ddb15f2391cc)
VMware Studio appliance in OVF 1.0
Deployment URL:
http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ovf
(md5sum:a3dfca29578a75b0440be3419396c85c)
(sha1sum:67f08e73de18ddeea257fefe6475f289d643ad77)
VMware Studio appliance in OVF 0.9
Deployment URL:
http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF09.ovf
(md5sum:959c61270dc872be2f5e65e59480852d)
(sha1sum:ac3c2d612f0b877f10ca607467b6a95b31ed3dd7)
VMDK associated to the OVF 1.0 and OVF 0.9 descriptor
(md5sum:617ec59063d2ba180b19f680fb1b49b1)
(sha1sum:eb1d474cde175a9e042c9613eae31822843394cf)
VMware Studio Plugin for Eclipse in ZIP
(md5sum:9970df718f08f92c053758187c979293)
(sha1sum:2d5a9a8d3d68faa3afd317b148f060a74cbd359a)
5. References
CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2968
- ------------------------------------------------------------------------
6. Change log
2009-08-31 VMSA-2009-0011
Initial security advisory after release of Studio 2.0 on 2009-08-31.
- ------------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center
http://www.vmware.com/security
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2009 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)
iD8DBQFKnLHmS2KysvBH1xkRAlUSAJ90vZzWYrMUgNwmnk1EWRTEyF+pKgCffeLt
sMSBGdvumE+14/pi4woV46Q=
=jbNX
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists