Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   VMware Vendors:   VMware
VMware View Server Directory Traversal Flaw Discloses Files to Remote Users
SecurityTracker Alert ID:  1027875
SecurityTracker URL:
CVE Reference:   CVE-2012-5978   (Links to External Site)
Date:  Dec 14 2012
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.x prior to 4.6.2, 5.x prior to 5.1.2
Description:   A vulnerability was reported in VMware View Server. A remote user can view files on the target system.

The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view arbitrary files on target system.

The Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) reported this vulnerability.

Impact:   A remote user can view arbitrary files on the target system.
Solution:   The vendor has issued a fix (View Server 4.6.2, 5.1.2).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.

 Source Message Contents

Subject:  [Security-announce] VMSA-2012-0017 - VMware View Server directory traversal

Hash: SHA1

- -----------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2012-0017
Synopsis:    VMware View Server directory traversal
Issue date:  2012-12-13
Updated on:  2012-12-13 (initial advisory)
CVE numbers: CVE-2012-5978
- -----------------------------------------------------------------------

1. Summary

   VMware View releases address a critical directory traversal
   vulnerability in the View Connection Server and View Security

2. Relevant releases

   VMware View 5.x prior to version 5.1.2
   VMware View 4.x prior to version 4.6.2

3. Problem Description

   a. VMware View Server directory traversal

      VMware View contains a critical directory traversal
      vulnerability that allows an unauthenticated remote attacker to
      retrieve arbitrary files from affected View Servers.
      Exploitation of this issue may expose sensitive information
      stored on the server.


      This vulnerability affects both the View Connection Server and
      the View Security Server; VMware recommends that customers
      immediately update both servers to a fixed version of View.

      Customers who are unable to immediately update their View
      Servers should consider the following options:

      - Disable Security Server

      	Disabling the Security Server will prevent exploitation of
      	this vulnerability over untrusted remote networks.  To restore
      	functionality for remote users, allow them to connect to the
      	Connection Server via a VPN.

      - Block directory traversal attempts

	It may be possible to prevent exploitation of this issue by
	blocking directory traversal attacks with an intrusion
	protection system or application layer firewall.

      VMware would like to thank the Digital Defense, Inc. (DDI)
      Vulnerability Research Team (VRT) for reporting this issue to
      The Common Vulnerabilities and Exposures project (
      has assigned the name CVE-2012-5978 to this issue.
      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is
      VMware         Product   Running  Replace with/
      Product        Version   on       Apply Patch
      =============  ========  =======  =================
      View           5.x       Windows  View 5.1.2
      View           4.x       Windows  View 4.6.2
4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   View 5.1.2
   Release Notes

   VMware View Connection Server (32-bit)
   md5sum: 966d158be1d14268f9ef5623e0572691
   sha1sum: 39e3a9205516488743df361e086faa59387e039e

   VMware View Connection Server (64-bit)
   md5sum: c4f791d3d141032cd88b9075e9680b90
   sha1sum: 8866e3abae8059264672b1a8ff23a8372f620b1d

   View 4.6.2
   Release Notes

   VMware View Connection Server (32-bit)
   md5sum: 77ec27c0514afa179a62ecee410231a4
   sha1sum: 7f5219d833366429777f5bd79323d03ccbea5b71

   VMware View Connection Server (64-bit)
   md5sum: d18de68abdb4fc52e3be65c5eca4e78b
   sha1sum: 61add81d978e8a3e68fbe64e3fdc9a6b00c140b7
5. References

- -----------------------------------------------------------------------

6. Change log

   2012-12-13 VMSA-2012-0017
   Initial security advisory in conjunction with the release of View
   5.1.2 on 2012-12-13.

- -----------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   This Security Advisory is posted to the following lists:
     * security-announce at
     * bugtraq at
     * full-disclosure at
   E-mail:  security at
   PGP key at:
   VMware Security Advisories
   VMware security response policy
   General support life cycle policy
   VMware Infrastructure support life cycle policy
   Copyright 2012 VMware Inc.  All rights reserved.
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools -


Security-announce mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC