SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   VMware vCloud Vendors:   VMware, Inc.
VMware vCloud Director Session Management Flaw Permits Cross-Site Request Forgery Attacks
SecurityTracker Alert ID:  1029645
SecurityTracker URL:  http://securitytracker.com/id/1029645
CVE Reference:   CVE-2014-1211   (Links to External Site)
Date:  Jan 17 2014
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.1.x prior to 5.1.3
Description:   A vulnerability was reported in VMware vCloud Director. A remote user can conduct cross-site request forgery attacks.

A remote user can take actions on the management interface acting as the target user.

Mattia Folador reported this vulnerability.

Impact:   A remote user can take actions on the interface acting as the target user.
Solution:   The vendor has issued a fix (5.1.3).

The vendor's advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2014-0001.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2014-0001.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Thu, 16 Jan 2014 21:10:43 -0800 (PST)
Subject:  [Security-announce] NEW : VMSA-2014-0001 - VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2014-0001
Synopsis:    VMware Workstation, Player, Fusion, ESXi, ESX and vCloud 
             Director address several security issues 
Issue date:  2014-01-16
Updated on:  2014-01-16 (initial advisory)
CVE numbers: CVE-2014-1207, CVE-2014-1208, CVE-2014-1211
           
- -----------------------------------------------------------------------

1. Summary

      VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director
      address several security issues. 

2. Relevant releases


      VMware Workstation 9.x prior to version 9.0

      VMware Player 5.x prior to version 5.0

      VMware Fusion 5.x prior to version 5.0

      VMware ESXi 5.1 without patch ESXi510-201401101
      VMware ESXi 5.0 without patch ESXi500-201310101
      VMware ESXi 4.1 without patch ESXi410-201312401
      VMware ESXi 4.0 without patch ESXi400-201310401

      VMware ESX 4.1 without patch ESX410-201312401
      VMware ESX 4.0 without patch ESX400-201310401

      vCloud Director 5.1.x prior to version 5.1.3

3. Problem Description

a. VMware ESXi and ESX NFC NULL pointer dereference

      VMware ESXi and ESX contain a NULL pointer dereference in 
      the handling of the Network File Copy (NFC) traffic. To 
      exploit this vulnerability, an attacker must intercept and
      modify the NFC traffic between ESXi/ESX and the client.  
      Exploitation of the issue may lead to a Denial of Service.

      To reduce the likelihood of exploitation, vSphere components  
      should be deployed on an isolated management network.
     
      VMware would like to thank Alex Chapman of Context Information
      Security for reporting this issue to us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has
      assigned the name CVE-2014-1207 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

      VMware		Product	Running	Replace with/
      Product		Version	on	Apply Patch
      =============	=======	=======	=================
      vCenter Server    any     any     not affected

      hosted*           any     any     not affected

      ESXi		5.5	ESXi	not affected
      ESXi		5.1	ESXi	ESXi510-201401101-SG
      ESXi		5.0	ESXi	ESXi500-201310101-SG
      ESXi		4.1	ESXi	ESXi410-201312401-SG
      ESXi		4.0	ESXi	ESXi400-201310401-SG
		
      ESX		4.1	ESX	ESX410-201312401-SG
      ESX		4.0	ESX	ESX400-201310401-SG
   
      * hosted products are VMware Workstation, Player and Fusion. 
 

b. VMware VMX process denial of service vulnerability

      Due to a flaw in the handling of invalid ports, it is possible 
      to cause the VMX process to fail. This vulnerability may allow a 
      guest user to affect the VMX process resulting in a partial denial of
      service on the host.

      VMware would like to thank Recurity Labs GmbH and the Bundesamt 
      Sicherheit in der Informationstechnik (BSI) for reporting this 
      issue to us

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has
      assigned the name CVE-2014-1208 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

      VMware		Product	Running	  Replace with/
      Product		Version	on	  Apply Patch
      =============	=======	=======	  =================
      vCenter Server    any     any       not affected

      Workstation       10.0    any       not affected
      Workstation       9.0     any       9.0.1 or later

      Player            6.0     any       not affected
      Player            5.0     any       5.0.1 or later

      Fusion		6.0	Mac OS/X  not affected
      Fusion            5.0     Mac OS/X  5.0.1 or later

      ESXi		5.5	ESXi	  not affected
      ESXi		5.1	ESXi	  ESXi510-201401101-SG
      ESXi		5.0	ESXi	  ESXi500-201310101-SG
      ESXi		4.1	ESXi	  ESXi410-201312401-SG
      ESXi		4.0	ESXi	  ESXi400-201310401-SG
		
      ESX		4.1	ESX	  ESX410-201312401-SG
      ESX		4.0	ESX	  ESX410-201312401-SG
   

c. VMware vCloud Director Cross Site Request Forgery (CSRF)

      VMware vCloud Director contains a vulnerability in the Hyper Text
Transfer
      Protocol (http) session management. An attacker may trick an
authenticated 
      user to click a malicious link, which would result in the user being
logged
      out. The user is able to immediately log back into the system. 

      VMware would like to thank Mattia Folador for reporting this issue to
us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org) has
      assigned the name CVE-2014-1211 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

      VMware		Product	Running	Replace with/
      Product		Version	on	Apply Patch
      =============	=======	=======	=================
      vCloud Director   5.5 	any     not affected
      vCloud Director   5.1.x 	any     5.1.3

 
4. Solution

      Please review the patch/release notes for your product and version
      and verify the checksum of your downloaded file. 


      VMware Workstation 9.x
      ---------------------- 
      https://www.vmware.com/go/downloadworkstation 

      VMware Player 5.x
      ------------------ 
      https://www.vmware.com/go/downloadplayer 

      Fusion 5.x 
      ------------------ 
      https://www.vmware.com/go/downloadfusion 
    
      ESXi and ESX
      ------------------ 
      https://www.vmware.com/patchmgr/download.portal 

      ESXi 5.1 
      ------------------ 
      File: update-from-esxi5.1-5.1_update02.zip
      md5sum: 462cb98dc011804d3bad85f54f6b8133
      sha1sum: 0352bf0adc78ceead74c7ace256ed87705e64703
      http://kb.vmware.com/kb/2062314
      update-from-esxi5.1-5.1_update02 contains ESXi510-201401101-SG

      ESXi 5.0 
      ------------------ 
      File: update-from-esxi5.0-5.0_update03.zip
      md5sum: 7e6185fa3238a4895613b39e57a2a94b
      sha1sum: aa3929d2c8183aeaecdc238cbbf4d270bd70dd07
      http://kb.vmware.com/kb/2055559
      update-from-esxi5.0-5.0_update03 contains ESXi500-201310101-SG

      ESXi 4.1 
      ------------------ 
      File: ESXi410-201312001.zip
      md5sum: f85c0c449513b88b22f19a5f11966d5e
      sha1sum: cfde5abbef77976b76d55813ae1e7bbbbca25b7b
      http://kb.vmware.com/kb/2061210
      ESXi410-201312001 contains ESX410-201312401-SG

      ESXi 4.0 
      ------------------ 
      File: ESXi400-201310001.zip
      md5sum: 3075bce1b19a52b053a5dc18d06d40e0
      sha1sum: 19952da0dd9f81ea299cb8ae6c462f11566b56e0
      http://kb.vmware.com/kb/2059496
      ESXi400-201310001 contains ESXi400-201310401-SG

      ESX 4.1 
      ------------------ 
      File: ESX410-201312001.zip
      md5sum: c35763a84db169dd0285442d4129cc18
      sha1sum: ee8e1b8d2d383422ff0dde04749c5d89e77d8e40
      http://kb.vmware.com/kb/2061209
      ESX410-201312001 contains ESX410-201312401-SG

      ESX 4.0 
      ------------------ 
      File: ESX400-201310001.zip
      md5sum: 9d47cf815ed142a17f97002379b5e386
      sha1sum: 91082ec4263333f9b996883cb53dbe9aab7a88b5
      http://kb.vmware.com/kb/2059495
      ESX400-201310001contains ESX400-201310401-SG

      vCloud Director 5.1.x
      ---------------------
      https://www.vmware.com/go/download/vcloud-director

5. References

      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1207
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1208
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1211

- -----------------------------------------------------------------------

6. Change log

      2014-01-16 VMSA-2014-0001
      Initial security advisory in conjunction with the release of
      vSphere 5.1 Update 2 and vCloud Director 5.1.3 on 2014-01-16

- -----------------------------------------------------------------------

7. Contact

      E-mail list for product security notifications and announcements:
      http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

      This Security Advisory is posted to the following lists:

      * security-announce at lists.vmware.com
      * bugtraq at securityfocus.com
      * full-disclosure at lists.grok.org.uk

      E-mail: security at vmware.com
      PGP key at: http://kb.vmware.com/kb/1055

      VMware Security Advisories
      http://www.vmware.com/security/advisories

      VMware security response policy
      http://www.vmware.com/support/policies/security_response.html

      General support life cycle policy
      http://www.vmware.com/support/policies/eos.html

      VMware Infrastructure support life cycle policy
      http://www.vmware.com/support/policies/eos_vi.html

      Copyright 2014 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFS2CeQDEcm8Vbi9kMRAuyMAJ9eCuV97LwvO10qrfRe1c1Bk/8r5gCg+DFT
kBZkSb9II9ALA9cdRbdhi0g=
=F0eg
-----END PGP SIGNATURE-----
_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
http://lists.vmware.com/mailman/listinfo/security-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC