SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   VMware Vendors:   VMware, Inc.
VMware Workstation/ACE/Player/Server OpenProcess Bug Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1020790
SecurityTracker URL:  http://securitytracker.com/id/1020790
CVE Reference:   CVE-2008-3698   (Links to External Site)
Date:  Sep 1 2008
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Workstation 5.x prior to 5.5.8 build 108000; Player 1.x prior to 1.0.8 build 109488; ACE 1.x prior to 1.0.7 build 108880; Server 1.x prior to 1.0.7 build 108231.
Description:   A vulnerability was reported in VMware Workstation, ACE, Player, and Server. A local user can obtain elevated privileges on the target system.

A local user can exploit a flaw in OpenProcess to gain elevated privileges on the host system.

Only Windows-based hosts are affected.

Sun Bing from McAfee reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target host system.
Solution:   The vendor has issued the following fixes.

Workstation: 5.5.8 build 108000 or later

Player: 1.0.8 build 109488 or later

ACE: 1.0.7 build 108880 or later

Server: 1.0.7 build 108231 or later

The vendor's advisory will be available at:

http://www.vmware.com/security/advisories/VMSA-2008-0014.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2008-0014.html (Links to External Site)
Cause:   Not specified
Underlying OS:   Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Fri, 29 Aug 2008 17:08:36 -0700
Subject:  VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2008-0014
Synopsis:          Updates to VMware Workstation, VMware Player,
                   VMware ACE, VMware Server, VMware ESX address
                   information disclosure, privilege escalation and
                   other security issues.
Issue date:        2008-08-29
Updated on:        2008-08-29 (initial release of advisory)
CVE numbers:       CVE-2008-2101 CVE-2007-5269 CVE-2008-1447
                   CVE-2008-3691 CVE-2008-3692 CVE-2008-3693
                   CVE-2008-3694 CVE-2008-3695 CVE-2007-5438
                   CVE-2008-3696 CVE-2008-3697 CVE-2008-3698
                   CVE-2008-1806 CVE-2008-1807 CVE-2008-1808
                   CVE-2007-5503
- --------------------------------------------------------------------------

1. Summary

      Updates to VMware Workstation, VMware Player, VMware ACE, VMware
      Server, VMware ESX address information disclosure, privilege
      escalation and other security issues.

2. Relevant releases

      VMware Workstation 6.0.4 and earlier,
      VMware Workstation 5.5.7 and earlier,
      VMware Player 2.0.4 and earlier,
      VMware Player 1.0.7 and earlier,
      VMware ACE 2.0.4 and earlier,
      VMware ACE 1.0.6 and earlier,
      VMware Server 1.0.6 and earlier,

      VMware ESX 3.0.3 without patches ESX303-200808404-SG, ESX303-200808403-SG
                                       ESX303-200808406-SG.


      VMware ESX 3.0.2 without patches ESX-1005109, ESX-1005113,
                                       ESX-1005114.

      VMware ESX 3.0.1 without patches ESX-1005108, ESX-1005112,
                                       ESX-1005111, ESX-1004823,
                                       ESX-1005117.

      NOTE: Hosted products VMware Workstation 5.x, VMware Player 1.x,
            and VMware ACE 1.x will reach end of general support
            2008-11-09. Customers should plan to upgrade to the latest
            version of their respective products.

            Extended support (Security and Bug fixes) for ESX 3.0.2 ends
            on 10/29/2008 and Extended support for ESX 3.0.2 Update 1
            ends on 8/8/2009.  Users should plan to upgrade to ESX 3.0.3
            and preferably to the newest release available.

            Extended Support (Security and Bug fixes) for ESX 3.0.1 has
            ended on 2008-07-31.  The 3.0.1 patches are released in
            August because there was no patch release in July.

3. Problem Description

 I Security Issues

  a. Setting ActiveX killbit

      Starting from this release, VMware has set the killbit on its
      ActiveX controls. Setting the killbit ensures that ActiveX
      controls cannot run in Internet Explorer (IE), and avoids
      security issues involving ActiveX controls in IE. See the
      Microsoft KB article 240797 and the related references on this
      topic.

      Security vulnerabilities have been reported for ActiveX controls
      provided by VMware when run in IE. Under specific circumstances,
      exploitation of these ActiveX controls might result in denial-of-
      service or can allow running of arbitrary code when the user
      browses a malicious Web site or opens a malicious file in IE
      browser. An attempt to run unsafe ActiveX controls in IE might
      result in pop-up windows warning the user.

      Note: IE can be configured to run unsafe ActiveX controls without
            prompting.  VMware recommends that you retain the default
            settings in IE, which prompts when unsafe actions are
            requested.

      Earlier, VMware had issued knowledge base articles, KB 5965318 and
      KB 9078920 on security issues with ActiveX controls. To avoid
      malicious scripts that exploit ActiveX controls, do not enable
      unsafe ActiveX objects in your browser settings. As a best
      practice, do not browse untrusted Web sites as an administrator
      and do not click OK or Yes if prompted by IE to allow certain
      actions.

      VMware would like to thank Julien Bachmann, Shennan Wang, Shinnai,
      and Michal Bucko for reporting these issues to us.

      The Common Vulnerabilities and Exposures Project (cve.mitre.org)
      has assigned the names CVE-2008-3691, CVE-2008-3692,
      CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, CVE-2007-5438, and
      CVE-2008-3696 to the security issues with VMware ActiveX controls.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  =================
      VirtualCenter  any       Windows  not affected

      Workstation    6.x       Windows  6.0.5 build 109488 or later
      Workstation    6.x       Linux    not affected
      Workstation    5.x       Windows  5.5.8 build 108000 or later
      Workstation    5.x       Linux    not affected

      Player         2.x       Windows  2.0.5 build 109488 or later
      Player         2.x       Linux    not affected
      Player         1.x       Windows  1.0.8 build  or later
      Player         1.x       Linux    not affected

      ACE            2.x       Windows  2.0.5 build 109488 or later
      ACE            1.x       Windows  1.0.7 build 108880 or later

      Server         1.x       Windows  1.0.7 build 108231 or later
      Server         1.x       Linux    not affected

      Fusion         1.x       Mac OS/X not affected

      ESXi           3.5       ESXi     not affected

      ESX            any       ESX      not affected


  b. VMware ISAPI Extension Denial of Service

      The Internet Server Application Programming Interface (ISAPI) is
      an API that extends the functionality of Internet Information
      Server (IIS). VMware uses ISAPI extensions in its Server product.

      One of the ISAPI extensions provided by VMware is vulnerable to a
      remote denial of service. By sending a malformed request, IIS
      might shut down. IIS 6.0 restarts automatically. However, IIS 5.0
      does not restart automatically when its Startup Type is set to
      Manual.

      VMware would like to thank the Juniper Networks J-Security
      Security Research Team for reporting this issue to us.

      The Common Vulnerabilities and Exposures Project (cve.mitre.org)
      has assigned the name CVE-2008-3697 to this issue.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  =================
      VirtualCenter  any       Windows  not affected

      Workstation    6.x       Windows  not affected
      Workstation    6.x       Linux    not affected
      Workstation    5.x       Windows  not affected
      Workstation    5.x       Linux    not affected

      Player         2.x       Windows  not affected
      Player         2.x       Linux    not affected
      Player         1.x       Windows  not affected
      Player         1.x       Linux    not affected

      ACE            2.x       Windows  not affected
      ACE            1.x       Windows  not affected

      Server         1.x       Windows  1.0.7 build 108231 or later
      Server         1.x       Linux    not affected

      Fusion         1.x       Mac OS/X not affected

      ESXi           3.5       ESXi     not affected

      ESX            any       ESX      not affected

  c. OpenProcess Local Privilege Escalation on Host System

      This release fixes a privilege escalation vulnerability in host
      systems.  Exploitation of this vulnerability allows users to run
      arbitrary code on the host system with elevated privileges.

      VMware would like to thank Sun Bing from McAfee, Inc. for
      reporting this issue to us.

      The Common Vulnerabilities and Exposures Project (cve.mitre.org)
      has assigned the name CVE-2008-3698 to this issue.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  =================
      VirtualCenter  any       Windows  not affected

      Workstation    6.x       Windows  not affected
      Workstation    6.x       Linux    not affected
      Workstation    5.x       Windows  5.5.8 build 108000 or later
      Workstation    5.x       Linux    not affected

      Player         2.x       Windows  not affected
      Player         2.x       Linux    not affected
      Player         1.x       Windows  1.0.8 build 109488 or later
      Player         1.x       Linux    not affected

      ACE            2.x       Windows  not affected
      ACE            1.x       Windows  1.0.7 build 108880 or later

      Server         1.x       Windows  1.0.7 build 108231 or later
      Server         1.x       Linux    not affected

      Fusion         1.x       Mac OS/X not affected

      ESXi           3.5       ESXi     not affected

      ESX            any       ESX      not affected

  d. Update to Freetype

      FreeType 2.3.6 resolves an integer overflow vulnerability and other
      vulnerabilities that can allow malicious users to run arbitrary code
      or might cause a denial-of-service after reading a maliciously
      crafted file. This release updates FreeType to 2.3.7.

      The Common Vulnerabilities and Exposures Project (cve.mitre.com)
      has assigned the names CVE-2008-1806, CVE-2008-1807, and
      CVE-2008-1808 to the issues resolved in Freetype 2.3.6.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  =================
      VirtualCenter  any       Windows  not affected

      Workstation    6.x       Windows  not affected
      Workstation    6.x       Linux    6.0.5 build 109488 or later
      Workstation    5.x       Windows  not affected
      Workstation    5.x       Linux    5.5.8 build 108000 or later

      Player         2.x       Windows  not affected
      Player         2.x       Linux    2.0.5 build 109488 or later
      Player         1.x       Windows  not affected
      Player         1.x       Linux    1.0.8 build 108000 or later

      ACE            2.x       Windows  not affected
      ACE            1.x       Windows  not affected

      Server         1.x       Windows  not affected
      Server         1.x       Linux    1.0.7 build 108231 or later

      Fusion         1.x       Mac OS/X affected, patch pending

      ESXi           3.5       ESXi     not affected

      ESX            3.5       ESX      not affected
      ESX            3.0.3     ESX      not affected
      ESX            3.0.2     ESX      not affected
      ESX            3.0.1     ESX      not affected
      ESX            2.5.5     ESX      affected, patch pending
      ESX            2.5.4     ESX      affected, patch pending

  e. Update to Cairo

      Cairo 1.4.12 resolves an integer overflow vulnerability that can
      allow malicious users to run arbitrary code or might cause a
      denial-of-service after reading a maliciously crafted PNG file.
      This release updates Cairo to 1.4.14.

      The Common Vulnerabilities and Exposures (cve.mitre.com) has
      assigned the name CVE-2007-5503 to this issue.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  =================
      VirtualCenter  any       Windows  not affected

      Workstation    6.x       Windows  not affected
      Workstation    6.x       Linux    6.0.5 build 109488 or later
      Workstation    5.x       Windows  not affected
      Workstation    5.x       Linux    not affected

      Player         2.x       Windows  not affected
      Player         2.x       Linux    2.0.5 build 109488 or later
      Player         1.x       Windows  not affected
      Player         1.x       Linux    not affected

      ACE            2.x       Windows  not affected
      ACE            1.x       Windows  not affected

      Server         1.x       Windows  not affected
      Server         1.x       Linux    not affected

      Fusion         1.x       Mac OS/X affected, patch pending

      ESXi           3.5       ESXi     not affected

      ESX            any       ESX      not affected

   f. VMware Consolidated Backup(VCB) command-line utilities may expose
      sensitive information

      VMware Consolidated Backup command-line utilities accept the user
      password through the -p command-line option. Users logged into the
      service console could gain access to the username and password used
      by VCB command-line utilities when such commands are running.

      This patch resolves this issue by providing an alternative way of
      passing the password used by VCB command-line utilities.

      The following options are recommended for passing the password:

      1. The password is specified in /etc/backuptools.conf
      (PASSWORD=xxxxx), and -p is not used in the command line.
      /etc/backuptools.conf file permissions are read/write only
      for root.

      2. No password is specified in /etc/backuptools.conf and the
      -p option is not used in the command line. The user will be
       prompted to enter a password.

      ESX is not affected unless you use VCB.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the name CVE-2008-2101 to this issue.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  ===================
      VirtualCenter  any       Windows  not affected

      hosted *       any       any      not affected

      ESXi           3.5       ESXi     not affected

      ESX            3.5       ESX      ESX350-200806203-UG
      ESX            3.0.3     ESX      ESX303-200808403-SG
      ESX            3.0.2     ESX      ESX-1004824
      ESX            3.0.1     ESX      ESX-1004823
      ESX            2.5.5     ESX      not affected
      ESX            2.5.4     ESX      not affected

      * hosted products are VMware Workstation, Player, ACE, Server, Fusion

   g. Third Party Library libpng Updated to 1.2.29

      Several flaws were discovered in the way third party library
      libpng handled various PNG image chunks. An attacker could
      create a carefully crafted PNG image file in such a way that
      it causes an application linked with libpng to crash when the
      file is manipulated.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the name CVE-2007-5269 to this issue.

      NOTE: There are multiple patches required to remediate the issue.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  ===================
      VirtualCenter  any       Windows  not affected

      hosted *       any       any      not affected

      ESXi           3.5       ESXi     affected, patch pending

      ESX            3.5       ESX      affected, patch pending
      ESX            3.0.3     ESX      ESX303-200808404-SG
                                        ESX303-200808403-SG
      ESX            3.0.2     ESX      ESX-1005109 ESX-1005114 ESX-1005113
      ESX            3.0.1     ESX      ESX-1005112 ESX-1005108 ESX-1005111
      ESX            2.5.5     ESX      affected, patch pending
      ESX            2.5.4     ESX      affected, patch pending

      * hosted products are VMware Workstation, Player, ACE, Server, Fusion


 II ESX Service Console rpm updates

   a. update to bind

      This update upgrades the service console rpms for bind-utils and
      bind-lib to version 9.2.4-22.el3.

      Version 9.2.4.-22.el3 addresses the recently discovered
      vulnerability in the BIND software used for Domain Name
      resolution (DNS). VMware doesn't install all the BIND packages
      on ESX Server and is not vulnerable by default to the reported
      vulnerability. Of the BIND packages, VMware only ships bind-util
      and bind-lib in the service console and these components by
      themselves cannot be used to setup a DNS server. Bind-lib and
      bind-util are used in client DNS applications like nsupdate,
      nslookup, etc.

      VMware explicitly discourages installing applications like BIND
      on the service console. In case the customer has installed BIND,
      and the DNS server is configured to support recursive queries,
      their ESX Server system is affected and they should replace BIND
      with a patched version.

      Note: ESX Server will use the DNS server on the network it is
      on, so it is important to patch that DNS server.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the name CVE-2008-1447 to this issue.

      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  ===================
      VirtualCenter  any       Windows  not affected

      hosted *       any       any      not affected

      ESXi           3.5       ESXi     not affected

      ESX            3.5       ESX      patch pending
      ESX            3.0.3     ESX      ESX303-200808406-SG
      ESX            3.0.2     ESX      ESX-1006356
      ESX            3.0.1     ESX      ESX-1005117
      ESX            2.5.5     ESX      patch pending
      ESX            2.5.4     ESX      patch pending

      * hosted products are VMware Workstation, Player, ACE, Server, Fusion

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   VMware Workstation 6.0.5
   ------------------------
   http://www.vmware.com/download/ws/
   Release notes:
   http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

   Windows binary
   md5sum: 46b4c54f0493f59f52ac6c2965296859

   RPM Installation file for 32-bit Linux
   md5sum: 49ebfbd05d146ecc43262622ab746f03

   tar Installation file for 32-bit Linux
   md5sum: 14ac93bffeee72528629d4caecc5ef37

   RPM Installation file for 64-bit Linux
   md5sum: 0a856f1a1a31ba3c4b08bcf85d97ccf6

   tar Installation file for 64-bit Linux
   md5sum: 3b459254069d663e9873a661bc97cf6c

   VMware Workstation 5.5.8
   ------------------------
   http://www.vmware.com/download/ws/ws5.html
   Release notes:
   http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

   Windows binary:
   md5sum: 745c3250e5254eaf6e65fcfc4172070f

   Compressed Tar archive for 32-bit Linux
   md5sum: 65a454749d15d4863401619d7ff5566e

   Linux RPM version for 32-bit Linux
   md5sum: d80adc73b1500bdb0cb24d1b0733bcff


   VMware Player 2.0.5 and 1.0.8
   -----------------------------
   http://www.vmware.com/download/player/
   Release notes Player 1.x:
   http://www.vmware.com/support/player/doc/releasenotes_player.html
   Release notes Player 2.0
   http://www.vmware.com/support/player2/doc/releasenotes_player2.html

   2.0.5 Windows binary
   md5sum: 60265438047259b23ff82fdfe737f969

   VMware Player 2.0.5 for Linux (.rpm)
   md5sum: 3bc81e203e947e6ca5b55b3f33443d34

   VMware Player 2.0.5 for Linux (.tar)
   md5sum: f499603d790edc5aa355e45b9c5eae01

   VMware Player 2.0.5 - 64-bit (.rpm)
   md5sum: 85bc2f11d06c362feeff1a64ee5a6834

   VMware Player 2.0.5 - 64-bit (.tar)
   md5sum: b74460bb961e88817884c7e2c0f30215

   1.0.8 Windows binary
   md5sum: e5f927304925297a7d869f74b7b9b053

   Player 1.0.8 for Linux (.rpm)
   md5sum: a13fdb8d72b661cefd24e7dcf6e2a990

   Player 1.0.8 for Linux (.tar)
   md5sum: 99fbe861253eec5308d8c47938e8ad1e


   VMware ACE 2.0.5
   ----------------
   http://www.vmware.com/download/ace/
   Release notes 2.0:
   http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

   ACE Manager Server Virtual Appliance
   Virtual Appliance for the ACE Management Server
   md5sum: 41e7349f3b6568dffa23055bb629208d

   ACE for Window 32-bit and 64-bit
   Main installation file for Windows 32-bit and 64-bit host (ACE Option
   Page key required for enabling ACE authoring)
   md5sum:46b4c54f0493f59f52ac6c2965296859

   ACE Management Server for Windows
   ACE Management Server installation file for Windows
   md5sum:33a015c4b236329bcb7e12c82271c417

   ACE Management Server for Red Hat Enterprise Linux 4
   ACE Management Server installation file for Red Hat Enterprise Linux 4
   md5sum:dc3bd89fd2285f41ed42f8b28cd5535f

   ACE Management Server for SUSE Enterprise Linux 9
   ACE Management Server installation file for SUSE Enterprise Linux 9
   md5sum:2add6a4fc97e1400fb2f94274ce0dce0

   VMware ACE 1.0.7
   ----------------
   http://www.vmware.com/download/ace/
   Release notes:
   http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
   md5sum: 42d806cddb8e9f905722aeac19740f33

   VMware Server 1.0.7
   -------------------
   http://www.vmware.com/download/server/
   Release notes:
   http://www.vmware.com/support/server/doc/releasenotes_server.html

   VMware Server for Windows 32-bit and 64-bit
   md5sum: 2e2ee5ebe08ae48eac5e661cad01acf6

   VMware Server Windows client package
   md5sum: ce7d906a5a8de37cbc20db4332de1adb

   VMware Server for Linux
   md5sum: 04f201122b16222cd58fc81ca814ff8c

   VMware Server for Linux rpm
   md5sum: 6bae706df040c35851823bc087597d8d

   Management Interface
   md5sum: e67489bd2f23bcd4a323d19df4e903e8

   VMware Server Linux client package
   md5sum: 99f1107302111ffd3f766194a33d492b

   ESX
   ---
   ESX 3.5.0 patch ESX350-200806203-UG (VCB)
   http://download3.vmware.com/software/esx/ESX350-200806203-UG.zip
   md5sum: 3bd512dc8aa2b276f7cfd19080d193c9
   http://kb.vmware.com/kb/1005896

   ESX 3.0.3 patch ESX303-200808403-SG (libpng)
   http://download3.vmware.com/software/vi/ESX303-200808403-SG.zip
   md5sum: 5f1e75631e53c0e9e013acdbe657cfc7
   http://kb.vmware.com/kb/1006034

   ESX 3.0.3 patch ESX303-200808404-SG (libpng)
   http://download3.vmware.com/software/vi/ESX303-200808404-SG.zip
   md5sum: 65468a5b6ba105cfde1dd444d77b2df4
   http://kb.vmware.com/kb/1006035

   ESX 3.0.3 patch ESX303-200808406-SG (bind)
   http://download3.vmware.com/software/vi/ESX303-200808406-SG.zip
   md5sum: a11273e8d430e5784071caff673995f4
   http://kb.vmware.com/kb/1006357

   ESX 3.0.3 patch (VCB)

   ESX 3.0.2 patch ESX-1005109 (libpng)
   http://download3.vmware.com/software/vi/ESX-1005109.tgz
   md5sum: 456d74d94317f852024aed5d3852be09
   http://kb.vmware.com/kb/1005109

   ESX 3.0.2 patch ESX-1005113 (libpng)
   http://download3.vmware.com/software/vi/ESX-1005113.tgz
   md5sum: 5d604f2bfd90585b9c8679f5fc8c31b7
   http://kb.vmware.com/kb/1005113

   ESX 3.0.2 patch ESX-1005114 (libpng)
   http://download3.vmware.com/software/vi/ESX-1005114.tgz
   md5sum: 3b6d33b334f0020131580fdd8f9b5365
   http://kb.vmware.com/kb/1005114

   ESX 3.0.2 patch ESX-1004824 (VCB)
   http://download3.vmware.com/software/vi/ESX-1004824.tgz
   md5sum: c72b0132c9f5d7b4cb1b9e47748a9c5b
   http://kb.vmware.com/kb/1004824

   ESX 3.0.2 patch ESX-1006356 (bind)
   http://download3.vmware.com/software/vi/ESX-1006356.tgz
   md5sum: f0bc9d0b641954145df3986cdb1c2bab
   http://kb.vmware.com/kb/1006356

   ESX 3.0.1 patch ESX-1005111 (libpng)
   http://download3.vmware.com/software/vi/ESX-1005111.tgz
   md5sum: 60e1be9b41070b3531c06f9a0595e24c
   http://kb.vmware.com/kb/1005111

   ESX 3.0.1 patch ESX-1005112 (libpng)
   http://download3.vmware.com/software/vi/ESX-1005112.tgz
   md5sum: ad645cef0f9fa18bb648ba5a37074732
   http://kb.vmware.com/kb/1005112

   ESX 3.0.1 patch ESX-1005108 (libpng)
   http://download3.vmware.com/software/vi/ESX-1005108.tgz
   md5sum: aabc873d978f023c929ccd9a54588ea5
   http://kb.vmware.com/kb/1005108

   ESX 3.0.1 patch ESX-1004823 (VCB)
   http://download3.vmware.com/software/vi/ESX-1004823.tgz
   md5sum: 5ff2e8ce50c18afca76fb16c28415a59
   http://kb.vmware.com/kb/1004823

   ESX 3.0.1 patch ESX-1005117 (bind)
   http://download3.vmware.com/software/vi/ESX-1005117.tgz
   md5sum: 5271ecc6e36fb6f1fdf372e57891aa33
   http://kb.vmware.com/kb/1005117


5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2101
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3691
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3692
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3693
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3694
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3695
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5438
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3696
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3697
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3698
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503

- ------------------------------------------------------------------------
6. Change log

2008-08-29  VMSA-2008-0014
initial release

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2008 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFIuI98S2KysvBH1xkRCJp7AJ9Mq0+CEdoQRLzPLSRbv5OLqXqUHACfUSRt
bZpHL8qHcNwAiTVz6P3+W6E=
=PQ58
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC