SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware ESXi Vendors:   VMware
(VMware Issues Fix for VMware ESXi) Glibc Regex Bug Lets Remote or Local Users Deny Service
SecurityTracker Alert ID:  1030826
SecurityTracker URL:  http://securitytracker.com/id/1030826
CVE Reference:   CVE-2013-0242   (Links to External Site)
Date:  Sep 10 2014
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): ESXi 5.5
Description:   A vulnerability was reported in Glibc. A remote or local user can cause denial of service conditions. VMware ESXi is affected.

A remote or local user can send specially crafted data to trigger a regex processing error and cause the target application to crash.

The vulnerability resides in 'posix/regexec.c'.

The original advisory is available at:

http://sourceware.org/bugzilla/show_bug.cgi?id=15078

Impact:   A remote or local user can cause denial of service conditions.
Solution:   VMware has issued a fix for ESXi (ESXi550-201409101-SG).

The VMware advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2014-0008.html

Vendor URL:  www.gnu.org/software/libc/ (Links to External Site)
Cause:   Input validation error

Message History:   This archive entry is a follow-up to the message listed below.
Jan 31 2013 Glibc Regex Bug Lets Remote or Local Users Deny Service



 Source Message Contents

Subject:  [Security-announce] NEW VMSA-2014-0008 VMware vSphere product updates to third party libraries

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2014-0008
Synopsis:    VMware vSphere product updates to third party libraries
Issue date:  2014-09-09
Updated on:  2014-09-09 (Initial Advisory)
CVE numbers:  --- Struts ---
             CVE-2014-0114
             --- tc-server ---
              CVE-2013-4590, CVE-2013-4322, and CVE-2014-0050
             --- glibc ---
             CVE-2013-0242 and CVE-2013-1914
             --- JRE ---
             See references
- ------------------------------------------------------------------------

1. Summary

    VMware has updated vSphere third party libraries

2. Relevant releases

 
    VMware vCenter Server 5.5 prior to Update 2

    VMware vCenter Update Manager 5.5 prior to Update 2

    VMware ESXi 5.5 without patch ESXi550-201409101-SG


3. Problem Description

   a. vCenter Server Apache Struts Update

      The Apache Struts library is updated to address a security issue.  

      This issue may lead to remote code execution after authentication.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2014-0114 to this issue.


      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product	Running	Replace with/
      Product        Version	on	      Apply Patch
      =============  =======	=======	=================
      vCenter Server 5.5       any         5.5 Update 2
      vCenter Server 5.1       any         Patch Pending
      vCenter Server 5.0       any         Patch Pending

   b. vCenter Server tc-server 2.9.5 / Apache Tomcat 7.0.52 updates

      tc-server has been updated to version 2.9.5 to address multiple 
      security issues. This version of tc-server includes Apache Tomcat 
      7.0.52.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2013-4590, CVE-2013-4322, and 
      CVE-2014-0050 to these issues. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                 Product	Running    Replace with/
      Product                Version	on	     Apply Patch
      =============          =======	=======    =================
      vCenter Server         5.5     any        5.5 Update 2
      vCenter Server         5.1     any        Patch Pending
      vCenter Server         5.0     any        Patch Pending
 
   c. Update to ESXi glibc package

      glibc is updated to address multiple security issues.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2013-0242 and CVE-2013-1914 to 
      these issues. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product	Running  Replace with/
      Product        Version	on	   Apply Patch
      =============  =======	=======  =================
      ESXi           5.5       any      ESXi550-201409101-SG
      ESXi           5.1       any      Patch Pending
      ESXi           5.0       any      Patch Pending

d. vCenter and Update Manager, Oracle JRE 1.7 Update 55

      Oracle has documented the CVE identifiers that are addressed in 
      JRE 1.7.0 update 55 in the Oracle Java SE Critical Patch Update 
      Advisory of April 2014. The References section provides a link to
      this advisory.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                 Product	Running  Replace with/
      Product                Version	on       Apply Patch
      =============          =======	=======  =================
      vCenter Server         5.5     any      5.5 Update 2
      vCenter Server         5.1     any      not applicable *
      vCenter Server         5.0     any      not applicable *
      vCenter Update Manager 5.5     any      5.5 Update 2
      vCenter Update Manager 5.1     any      not applicable *
      vCenter Update Manager 5.0     any      not applicable *
 
      * this product uses the Oracle JRE 1.6.0 family *

4. Solution

   Please review the patch/release notes for your product and version 
   and verify the checksum of your downloaded file. 

 
   vCenter Server and Update Manager 5.5u2
   ---------------------------------------
   Downloads and Documentation:
   https://www.vmware.com/go/download-vsphere

   ESXi 5.5
   --------
   Download:
   https://www.vmware.com/patchmgr/findPatch.portal
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914

   JRE
   ---
   Oracle Java SE Critical Patch Update Advisory of April 2014
  
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html


- ------------------------------------------------------------------------

6. Change log

   2014-09-09 VMSA-2014-0008
   Initial security advisory in conjunction with the release of vSphere
   5.5 Update 2 on 2014-09-09.

- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2014 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8

wj8DBQFUD2LADEcm8Vbi9kMRAp0lAKCCB15Aa21ThBMqWRJTeYEweSVrdQCaAsNC
he8AihUDo3UB9amCBiImxq0=
=W0+t
-----END PGP SIGNATURE-----
_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
http://lists.vmware.com/mailman/listinfo/security-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC