首页
社区
课程
招聘
[转帖]VMware最新的升级安全漏洞( Update Manager )
发表于: 2010-7-20 21:41 4184

[转帖]VMware最新的升级安全漏洞( Update Manager )

2010-7-20 21:41
4184
虽然鸟语不是太好。。但是用google翻译个大概。偶尔还能记住几个单词~看到这个是昨天发布的。搜索了一下。国内目前很少有。所以选择我们的基地。看雪。。。。。。。。。
                  VMware Security Advisory

Advisory ID:       VMSA-2010-0012
Synopsis:          VMware vCenter Update Manager fix for Jetty Web
                   server addresses important security vulnerabilities
Issue date:        2010-07-19
Updated on:        2010-07-19 (initial release of advisory)
CVE numbers:       CVE-2009-1523 CVE-2009-1524
- ------------------------------------------------------------------------

1. Summary

    VMware vCenter Update Manager fix for Jetty Web server addresses
    important security vulnerabilities.

2. Relevant releases

    VMware vCenter Update Manager 1.0
    VMware vCenter Update Manager 4.0
    VMware vCenter Update Manager 4.1

3. Problem Description

a. VMware vCenter Update Manager Jetty Web server vulnerabilities

    VMware vCenter Update Manager is an automated patch management
    solution for VMware ESX hosts and Microsoft virtual machines. Update
    Manager embeds the Jetty Web server which is a third party
    component.

    The default version of the Jetty Web server in Update Manager is
    version 6.1.6 for which the following relevant vulnerabilities are
    reported.

    A directory traversal vulnerability in Jetty allows for obtaining
    files from the system where Update Manager is installed by a remote,
    unauthenticated attacker. The attacker would need to be on the same
    network as the system where Update Manager is installed.

    A cross-site scripting vulnerability in Jetty allows for running
    JavaScript in the browser of the user who clicks a URL containing a
    malicious request to Update Manager. For an attack to be successful
    the attacker would need to lure the user into clicking the malicious
    URL.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2009-1523 and CVE-2009-1524 to these issues.

    VMware would like to thank Claudio Criscione of Secure Network for
    reporting these issues to us.

    Column 4 of the following table lists the action required to
    remediate the vulnerabilities in each release, if a solution is
    available.  

    VMware           Product  Running  Replace with/
    Product          Version  on       Apply Patch
    ==============   =======  =======  =================
    Update Manager       1.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.1  Windows  Update Manager fix for Jetty *

    * Refer to VMware Knowledge Base article 1023962

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   VMware vCenter Update Manager
   -----------------------------
   Update Manager fix for Jetty
   25eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0T1i4K6u0W2N6X3#2%4j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3K9$3u0Q4x3V1j5I4x3o6t1K6z5e0j5J5i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.  

5. References

   CVE numbers
   b04K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4$3k6g2)9J5k6h3#2A6N6s2u0W2i4K6u0W2L8%4u0Y4i4K6u0r3j5$3N6A6i4K6u0V1j5X3W2F1i4K6u0r3j5%4k6W2L8X3q4E0k6g2)9J5k6h3y4Y4K9g2)9K6c8X3&6S2L8h3g2Q4x3@1c8o6g2V1g2Q4x3X3b7J5x3o6l9&6i4K6u0V1x3e0f1J5x3H3`.`.
   05dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4$3k6g2)9J5k6h3#2A6N6s2u0W2i4K6u0W2L8%4u0Y4i4K6u0r3j5$3N6A6i4K6u0V1j5X3W2F1i4K6u0r3j5%4k6W2L8X3q4E0k6g2)9J5k6h3y4Y4K9g2)9K6c8X3&6S2L8h3g2Q4x3@1c8o6g2V1g2Q4x3X3b7J5x3o6l9&6i4K6u0V1x3e0f1J5y4l9`.`.

- ------------------------------------------------------------------------
6. Change log

2010-07-19  VMSA-2010-0012
Initial security advisory after release of VMware vCenter Update Manager
security fix for the Jetty Web server on 2010-07-19.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
231K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3I4A6M7%4c8K6i4K6u0W2N6X3#2%4j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3j5$3N6A6i4K6u0V1j5X3W2F1i4K6u0r3L8h3q4A6L8r3#2S2L8W2)9J5c8X3I4A6M7%4c8A6L8X3k6G2i4K6u0r3M7$3g2U0N6i4u0A6N6s2W2Q4x3X3c8S2L8X3&6G2N6h3&6U0k6b7`.`.

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: 957K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3E0T1i4K6u0W2N6X3#2%4j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3K9$3u0Q4x3V1j5I4x3o6f1#2

VMware Security Center
2c8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6E0N6$3q4J5k6g2)9J5k6h3y4G2L8g2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6

VMware security response policy
6a8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6E0N6$3q4J5k6g2)9J5k6h3y4G2L8g2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3V1k6H3L8$3I4A6j5$3W2W2M7#2)9J5c8Y4y4W2j5%4g2J5K9i4c8&6i4K6g2X3M7X3g2K6M7r3!0F1M7$3g2Q4x3X3g2Z5N6r3#2D9

General support life cycle policy
923K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6E0N6$3q4J5k6g2)9J5k6h3y4G2L8g2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3V1k6H3L8$3I4A6j5$3W2W2M7#2)9J5c8X3g2G2M7#2)9J5k6h3S2@1L8h3H3`.

VMware Infrastructure support life cycle policy
7b8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6E0N6$3q4J5k6g2)9J5k6h3y4G2L8g2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3V1k6H3L8$3I4A6j5$3W2W2M7#2)9J5c8X3g2G2M7#2)9#2k6Y4k6A6i4K6u0W2K9s2c8E0L8l9`.`.

Copyright 2010 VMware Inc.  All rights reserved.

[培训]传播安全知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回