Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, ESXi and ESX address several security issues

Information

Severity

Severity

High

Family

Family

VMware Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

The remote ESXi is missing one or more security related Updates from VMSA-2012-0005.

Insight

Insight

VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, ESXi and ESX address several security issues: a. VMware Tools Display Driver Privilege Escalation The VMware XPDM and WDDM display drivers contain buffer overflow vulnerabilities and the XPDM display driver does not properly check for NULL pointers. Exploitation of these issues may lead to local privilege escalation on Windows-based Guest Operating Systems. b. vSphere Client internal browser input validation vulnerability The vSphere Client has an internal browser that renders html pages from log file entries. This browser doesn't properly sanitize input and may run script that is introduced into the log files. In order for the script to run, the user would need to open an individual, malicious log file entry. The script would run with the permissions of the user that runs the vSphere Client. c. vCenter Orchestrator Password Disclosure The vCenter Orchestrator (vCO) Web Configuration tool reflects back the vCenter Server password as part of the webpage. This might allow the logged-in vCO administrator to retrieve the vCenter Server password. d. vShield Manager Cross-Site Request Forgery vulnerability The vShield Manager (vSM) interface has a Cross-Site Request Forgery vulnerability. If an attacker can convince an authenticated user to visit a malicious link, the attacker may force the victim to forward an authenticated request to the server. e. vCenter Update Manager, Oracle (Sun) JRE update 1.6.0_30 Oracle (Sun) JRE is updated to version 1.6.0_30, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. f. vCenter Server Apache Tomcat update 6.0.35 Apache Tomcat has been updated to version 6.0.35 to address multiple security issues. g. ESXi update to third party component bzip2 The bzip2 library is updated to version 1.0.6, which resolves a security issue.

Affected Software

Affected Software

VMware vCenter Server 5.0 VMware vSphere Client 5.0 VMware vSphere Client 4.1 Update 1 and earlier VMware vCenter Orchestrator 4.2 VMware vCenter Orchestrator 4.1 Update 1 and earlier VMware vCenter Orchestrator 4.0 Update 3 and earlier VMware vShield Manager 4.1 Update 1 VMware vShield Manager 1.0 Update 1 VMware Update Manager 5.0 ESXi 5.0 without patches ESXi500-201203101-SG, ESXi500-201112402-BG ESXi 4.1 without patch ESXi410-201110202-UG ESXi 4.0 without patch ESXi400-201110402-BG ESX 4.1 without patch ESX410-201110201-SG ESX 4.0 without patch ESX400-201110401-SG

Solution

Solution

Apply the missing patch(es).