SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware vCenter Vendors:   VMware
(VMware Issues Fix for VMware vCenter) Red Hat JBoss FileUpload Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1031253
SecurityTracker URL:  http://securitytracker.com/id/1031253
CVE Reference:   CVE-2014-0050   (Links to External Site)
Date:  Nov 21 2014
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in JBoss. A remote user can cause denial of service conditions. VMware vCenter is affected.

A remote user can send a multipart request with a specially crafted Content-Type header to to trigger a flaw in the Apache Commons FileUpload component and cause JBoss Web to enter an infinite loop.

Impact:   A remote user can cause the target service to enter an infinite loop.
Solution:   VMware has issued a fix for VMware vCenter (5.5 Update 2).

A fix is pending for 5.0 and 5.1.

The VMware advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2014-0008.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2014-0252.html (Links to External Site)
Cause:   Input validation error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Mar 6 2014 Red Hat JBoss FileUpload Bug Lets Remote Users Deny Service



 Source Message Contents

Subject:  [Security-announce] VMSA-2014-0008.1 UPDATE - VMware vSphere product updates to third party libraries

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2014-0008.1
Synopsis:    VMware vSphere product updates to third party libraries
Issue date:  2014-09-09
Updated on:  2014-11-21
CVE numbers:  --- Struts ---
             CVE-2014-0114
             --- tc-server ---
              CVE-2013-4590, CVE-2013-4322, and CVE-2014-0050
             --- glibc ---
             CVE-2013-0242 and CVE-2013-1914
             --- JRE ---
             See references
- ------------------------------------------------------------------------

1. Summary

    VMware has updated vSphere third party libraries

2. Relevant releases

 
    VMware vCenter Server 5.5 prior to Update 2
    VMware vCenter Server 5.0 prior to Update 3c

    VMware vCenter Update Manager 5.5 prior to Update 2

    VMware ESXi 5.5 without patch ESXi550-201409101-SG


3. Problem Description

   a. vCenter Server Apache Struts Update

      The Apache Struts library is updated to address a security issue.  

      This issue may lead to remote code execution after authentication.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2014-0114 to this issue.


      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product	Running	Replace with/
      Product        Version	on	Apply Patch
      =============  =======	=======	=================
      vCenter Server 5.5        any     5.5 Update 2
      vCenter Server 5.1        any     Patch Pending
      vCenter Server 5.0        any     5.0 Update 3c

   b. vCenter Server tc-server 2.9.5 / Apache Tomcat 7.0.52 updates

      tc-server has been updated to version 2.9.5 to address multiple 
      security issues. This version of tc-server includes Apache Tomcat 
      7.0.52.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2013-4590, CVE-2013-4322, and 
      CVE-2014-0050 to these issues. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                 Product	Running	Replace with/
      Product                Version	on	Apply Patch
      =============          =======	=======	=================
      vCenter Server         5.5        any     5.5 Update 2
      vCenter Server         5.1        any     Patch Pending
      vCenter Server         5.0        any     Patch Pending
 
   c. Update to ESXi glibc package

      glibc is updated to address multiple security issues.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2013-0242 and CVE-2013-1914 to 
      these issues. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product	Running	Replace with/
      Product        Version	on	Apply Patch
      =============  =======	=======	=================
      ESXi           5.5        any     ESXi550-201409101-SG
      ESXi           5.1        any     Patch Pending
      ESXi           5.0        any     Patch Pending

d. vCenter and Update Manager, Oracle JRE 1.7 Update 55

      Oracle has documented the CVE identifiers that are addressed in 
      JRE 1.7.0 update 55 in the Oracle Java SE Critical Patch Update 
      Advisory of April 2014. The References section provides a link to
      this advisory.

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                 Product	Running	Replace with/
      Product                Version	on	Apply Patch
      =============          =======	=======	=================
      vCenter Server         5.5        any     5.5 Update 2
      vCenter Server         5.1        any     not applicable *
      vCenter Server         5.0        any     not applicable *
      vCenter Update Manager 5.5        any     5.5 Update 2
      vCenter Update Manager 5.1        any     not applicable *
      vCenter Update Manager 5.0        any     not applicable *

      * this product uses the Oracle JRE 1.6.0 family *

4. Solution

   Please review the patch/release notes for your product and version 
   and verify the checksum of your downloaded file. 

 
   vCenter Server and Update Manager 5.5u2
   ---------------------------------------
   Downloads and Documentation:
   https://www.vmware.com/go/download-vsphere

   vCenter Server 5.0u3c
   ---------------------------------------
   Downloads and Documentation:
   https://www.vmware.com/go/download-vsphere

   ESXi 5.5
   --------
   Download:
   https://www.vmware.com/patchmgr/findPatch.portal
   
5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914

   JRE
   ---
   Oracle Java SE Critical Patch Update Advisory of April 2014
  
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html


- ------------------------------------------------------------------------

6. Change log

   2014-09-09 VMSA-2014-0008
   Initial security advisory in conjunction with the release of vSphere
   5.5 Update 2 on 2014-09-09.

   2014-11-21 VMSA-2014-0008.1
   Updated advisory in conjunction with the release of vCenter 5.0 Update
   3c on 2014-11-20.

- ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2014 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8

wj8DBQFUb4geDEcm8Vbi9kMRAtVxAJ9uyTuknC7zbfopKOWJ6S5lhTYWXwCdFhHj
SyS2YNEzdRf47rm62rvnEqA=
=seJr
-----END PGP SIGNATURE-----
_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
http://lists.vmware.com/mailman/listinfo/security-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC