Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   VMware vCloud Vendors:   VMware
VMware vCloud Networking and Security (vCNS) Input Validation Flaw Lets Remote Users Obtain Sensitive Information
SecurityTracker Alert ID:  1030835
SecurityTracker URL:
CVE Reference:   CVE-2014-3796   (Links to External Site)
Date:  Sep 11 2014
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): vCNS 5.1.4 prior to, 5.5 prior to 5.5.3
Description:   A vulnerability was reported in VMware vCloud Networking and Security (vCNS). A remote user can obtain potentially sensitive information.

A remote user can obtain unspecified "critical" information.

VMware NSX 6.0.x is also affected.

Impact:   A remote user can obtain potentially sensitive information.
Solution:   The vendor has issued a fix (, 5.5.3).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error

Message History:   None.

 Source Message Contents

Subject:  [Security-announce] NEW VMSA-2014-0009 VMware NSX and vCNS product updates address a critical information disclosure vulnerability

Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2014-0009
Synopsis:    VMware NSX and vCNS product updates address a critical
             information disclosure vulnerability
Issue date:  2014-09-11
Updated on:  2014-09-11 (Initial Advisory)
CVE number:  CVE-2014-3796
- ------------------------------------------------------------------------

1. Summary

    VMware NSX and vCloud Networking and Security (vCNS) product updates
    address a vulnerability that could lead to critical information

2. Relevant releases
    NSX 6.0 prior to 6.0.6
    vCNS 5.5 prior to 5.5.3
    vCNS 5.1.4 prior to

3. Problem Description

   a. VMware NSX and vCNS information disclosure vulnerability

      VMware NSX and vCNS contain an input validation vulnerability.
      This issue may allow for critical information disclosure.

      The Common Vulnerabilities and Exposures project (
      has assigned the identifier CVE-2014-3796 to this issue.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is

      VMware         Product	Running   Replace with/
      Product        Version	on	    Apply Patch
      =============  =======	=======   =================
      NSX Edge       6.1        any      not affected
      NSX Edge       6.0        any      6.0.6
      vCNS Edge      5.5        any      5.5.3
      vCNS Edge      5.1        any
4. Solution

   Please review the patch/release notes for your product and version
   and verify the checksum of your downloaded file.

   VMware NSX



5. References

- ------------------------------------------------------------------------

6. Change log

   2014-09-11 VMSA-2014-0009
   Initial security advisory in conjunction with the release of VMware
   NSX 6.1 and 6.0.6 and on 2014-09-11. vCNS 5.5.3 was released
   on 2014-09-09.

- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:

   This Security Advisory is posted to the following lists:

    security-announce at
    bugtraq at
    fulldisclosure at

   E-mail: security at
   PGP key at:

   VMware Security Advisories

   VMware Security Response Policy

   VMware Lifecycle Support Phases

   Copyright 2014 VMware Inc.  All rights reserved.

Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8


Security-announce mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC