[Security-announce] UPDATED VMSA-2010-0012.2 VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities

VMware Security Announcements security-announce at lists.vmware.com
Thu May 5 21:50:40 PDT 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory
 
Advisory ID:       VMSA-2010-0012.2
Synopsis:          VMware vCenter Update Manager fix for Jetty Web
                   server addresses important security vulnerabilities
Issue date:        2010-07-19
Updated on:        2011-05-05
CVE numbers:       CVE-2009-1523 CVE-2009-1524
- ------------------------------------------------------------------------
 
1. Summary
 
    VMware vCenter Update Manager fix for Jetty Web server addresses
    important security vulnerabilities.
 
2. Relevant releases
 
    VMware vCenter Update Manager 4.1
    VMware vCenter Update Manager 4.0
    VMware vCenter Update Manager 1.0
 
3. Problem Description
 
 a. VMware vCenter Update Manager Jetty Web server vulnerabilities
 
    VMware vCenter Update Manager is an automated patch management
    solution for VMware ESX hosts and Microsoft virtual machines. Update
    Manager embeds the Jetty Web server which is a third party
    component.
 
    The default version of the Jetty Web server in Update Manager is
    version 6.1.6 for which the following relevant vulnerabilities are
    reported.
 
    A directory traversal vulnerability in Jetty allows for obtaining
    files from the system where Update Manager is installed by a remote,
    unauthenticated attacker. The attacker would need to be on the same
    network as the system where Update Manager is installed.
 
    A cross-site scripting vulnerability in Jetty allows for running
    JavaScript in the browser of the user who clicks a URL containing a
    malicious request to Update Manager. For an attack to be successful
    the attacker would need to lure the user into clicking the malicious
    URL.
 
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2009-1523 and CVE-2009-1524 to these issues.
 
    VMware would like to thank Claudio Criscione of Secure Network for
    reporting these issues to us.
 
    Column 4 of the following table lists the action required to
    remediate the vulnerabilities in each release, if a solution is
    available.  
 
    VMware           Product  Running  Replace with/
    Product          Version  on       Apply Patch
    ==============   =======  =======  =================
    Update Manager       4.1  Windows  Update 1
    Update Manager       4.0  Windows  Update 3
    Update Manager       1.0  Windows  Update Manager fix for Jetty *
 
    * Refer to VMware Knowledge Base article 1023962 for a workaround.
 
4. Solution
 
   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.
 
   VMware vCenter Update Manager 4.1 Update 1
   -------------------------------------------
 
http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_
0
   Release Notes:
 
http://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.htm
l
 
   File type: .iso
   md5sum: 729cf247aa5d33ceec431c86377eee1a
   sha1sum: c1e10a5fcbc1ae9d13348d43541d574c563d66f0
 
   File type: .zip
   md5sum: fd1441bef48a153f2807f6823790e2f0
   sha1sum: 31737a816ed1c08ab3a505fb6db2483f49ad7c19
 
   
   VMware vCenter Update Manager 4.0 Update 3
   ---------------------------
 
http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_
0
   Release Notes:
   http://www.vmware.com/support/vsphere4/doc/vsp_vc40_u3_rel_notes.html
 
   File type: .iso
   md5sum: b04780df75f70621d0c8794e8773a983
   sha1sum: a9f1398306158572ea1c3d202ed8c6ad922e0764

   File type: .zip
   md5sum: bc8179a639dcc6563d7dbf968095edc7
   sha1sum: 61b6dbb1bcf3aa74503e183317a00733b0253faa
    
   VMware vSphere Client
   File type: .exe
   md5sum: 1b90081e422358c407ad9696c70c70f7
   sha1sum: 7ba9043421f8b529b0da08fa83458069ccac0fe9

   
   VMware vCenter Update Manager Workaround
   ----------------------------------------
   Update Manager fix for Jetty
   http://kb.vmware.com/kb/1023962   
 
5. References
 
   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1523
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1524
 
- ------------------------------------------------------------------------
6. Change log
 
   2010-07-19  VMSA-2010-0012
   Initial security advisory after release of VMware vCenter Update Manager
   security fix for the Jetty Web server on 2010-07-19.
   2011-02-10  VMSA-2010-0012.1
   Updated security advisory in conjunction with the release of VMware
   vCenter Update Manager 4.1 Update 1 on 2011-02-10.
   2011-05-05  VMSA-2010-0012.2
   Updated security advisory in conjunction with the release of VMware
   vCenter Update Manager 4.0 Update 3 on 2011-05-05.

- ------------------------------------------------------------------------
7. Contact
 
   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:
 
     * security-announce at lists.vmware.com
     * bugtraq at securityfocus.com
     * full-disclosure at lists.grok.org.uk

   E-mail:  security at vmware.com
   PGP key at:
   http://kb.vmware.com/kb/1055
 
   VMware Security Center
   http://www.vmware.com/security

   VMware security response policy
   http://www.vmware.com/support/policies/security_response.html

   General support life cycle policy
   http://www.vmware.com/support/policies/eos.html

   VMware Infrastructure support life cycle policy
   http://www.vmware.com/support/policies/eos_vi.html

   Copyright 2011 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNw34GDEcm8Vbi9kMRArn6AJ9e/zdZX4lYNH/o11+QtXKcXsv+yQCg8lR2
BAbN5hBNnMX9onNdV6MuoB8=
=hJ7x
-----END PGP SIGNATURE-----




More information about the Security-announce mailing list