lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <378C75F3-32AF-42CF-9FBF-8E9992D0EAA7@vmware.com>
Date: Fri, 12 Aug 2016 14:53:56 +0000
From: VMware Security Response Center <security@...are.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>,
 "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: [FD] NEW VMSA-2016-0011 - vRealize Log Insight update addresses
 directory traversal vulnerability.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------------------
                           VMware Security Advisory

Advisory ID: VMSA-2016-0011
Severity:    Moderate
Synopsis:    vRealize Log Insight update addresses directory traversal
             vulnerability.
Issue date:  2016-08-11
Updated on:  2016-08-11 (Initial Advisory)
CVE number:  CVE-2016-5332

1. Summary

   vRealize Log Insight update addresses directory traversal vulnerability.

2. Relevant Products

   vRealize Log Insight

3. Directory traversal vulnerability in vRealize Log Insight

   vRealize Log Insight contains a vulnerability that may allow for a directory
   traversal attack. Exploitation of this issue may lead to a partial information
   disclosure. There are no known workarounds for this issue.

   VMware would like to thank Peter Nelson, Security Engineer at WakeMed Health
   & Hospitals for reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
   the identifier CVE-2016-5332 to this issue.

   Column 5 of the following table lists the action required to remediate the
   vulnerability in each release, if a solution is available.

   VMware                 Product   Running              Replace with/
   Product                Version   on        Severity   Apply Patch     Workaround
   ====================   =======   =======   ========   =============   ==========
   vRealize Log Insight   3.x       VA        Moderate   3.6.0           None
   vRealize Log Insight   2.x       VA        Moderate   3.6.0           None

4. Solution

   Please review the patch/release notes for your product and version and verify
   the checksum of your downloaded file.

   vRealize Log Insight 3.6.0
   Downloads and Documentation:
   https://my.vmware.com/web/vmware/details?downloadGroup=VRLI-360&productId=598&rPId=12336

5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5332

- ------------------------------------------------------------------------

6. Change log

   2016-08-11 VMSA-2016-0011 Initial security advisory in conjunction with the
   release of vRealize Log Insight 3.6.0 on 2016-08-11.

- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2016 VMware Inc.  All rights reserved.
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iEYEARECAAYFAlet4asACgkQDEcm8Vbi9kPVKACgnlsjsXyC+F6mjAMPDlnlpvRa
JxoAn1RGp6fgcwKnr5XabptCxIQb5jtP
=VkpN
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ