首页
社区
课程
招聘
[转帖]VMware最新的升级安全漏洞( Update Manager )
2010-7-20 21:41 3645

[转帖]VMware最新的升级安全漏洞( Update Manager )

2010-7-20 21:41
3645
虽然鸟语不是太好。。但是用google翻译个大概。偶尔还能记住几个单词~看到这个是昨天发布的。搜索了一下。国内目前很少有。所以选择我们的基地。看雪。。。。。。。。。
                  VMware Security Advisory

Advisory ID:       VMSA-2010-0012
Synopsis:          VMware vCenter Update Manager fix for Jetty Web
                   server addresses important security vulnerabilities
Issue date:        2010-07-19
Updated on:        2010-07-19 (initial release of advisory)
CVE numbers:       CVE-2009-1523 CVE-2009-1524
- ------------------------------------------------------------------------

1. Summary

    VMware vCenter Update Manager fix for Jetty Web server addresses
    important security vulnerabilities.

2. Relevant releases

    VMware vCenter Update Manager 1.0
    VMware vCenter Update Manager 4.0
    VMware vCenter Update Manager 4.1

3. Problem Description

a. VMware vCenter Update Manager Jetty Web server vulnerabilities

    VMware vCenter Update Manager is an automated patch management
    solution for VMware ESX hosts and Microsoft virtual machines. Update
    Manager embeds the Jetty Web server which is a third party
    component.

    The default version of the Jetty Web server in Update Manager is
    version 6.1.6 for which the following relevant vulnerabilities are
    reported.

    A directory traversal vulnerability in Jetty allows for obtaining
    files from the system where Update Manager is installed by a remote,
    unauthenticated attacker. The attacker would need to be on the same
    network as the system where Update Manager is installed.

    A cross-site scripting vulnerability in Jetty allows for running
    JavaScript in the browser of the user who clicks a URL containing a
    malicious request to Update Manager. For an attack to be successful
    the attacker would need to lure the user into clicking the malicious
    URL.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2009-1523 and CVE-2009-1524 to these issues.

    VMware would like to thank Claudio Criscione of Secure Network for
    reporting these issues to us.

    Column 4 of the following table lists the action required to
    remediate the vulnerabilities in each release, if a solution is
    available.  

    VMware           Product  Running  Replace with/
    Product          Version  on       Apply Patch
    ==============   =======  =======  =================
    Update Manager       1.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.1  Windows  Update Manager fix for Jetty *

    * Refer to VMware Knowledge Base article 1023962

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   VMware vCenter Update Manager
   -----------------------------
   Update Manager fix for Jetty
   http://kb.vmware.com/kb/1023962   

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1523
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1524

- ------------------------------------------------------------------------
6. Change log

2010-07-19  VMSA-2010-0012
Initial security advisory after release of VMware vCenter Update Manager
security fix for the Jetty Web server on 2010-07-19.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2010 VMware Inc.  All rights reserved.

[培训]二进制漏洞攻防(第3期);满10人开班;模糊测试与工具使用二次开发;网络协议漏洞挖掘;Linux内核漏洞挖掘与利用;AOSP漏洞挖掘与利用;代码审计。

收藏
点赞0
打赏
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回