SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware vCenter Vendors:   VMware
VMware vCenter Server Lets Remote Users Bypass LDAP Certificate Validation to Access Data Transmitted by the Target System
SecurityTracker Alert ID:  1033582
SecurityTracker URL:  http://securitytracker.com/id/1033582
CVE Reference:   CVE-2015-6932   (Links to External Site)
Date:  Sep 16 2015
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Server; 5.5.x prior to 5.5 update 3, 6.0.x prior to 6.0 update 1
Description:   A vulnerability was reported in VMware vCenter Server. A remote user can bypass certificate validation on the target system.

The system does not validate TLS certificates when binding to an LDAP server. A remote user that can conduct a man-in-the-middle attack can intercept network traffic between the LDAP server and the target system.

Impact:   A remote user that can conduct a man-in-the-middle attack can intercept network traffic between the LDAP server and the target system.
Solution:   The vendor has issued a fix (5.5 u3, 6.0 u1).

The vendor's advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2015-0006.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2015-0006.html (Links to External Site)
Cause:   Authentication error

Message History:   None.


 Source Message Contents

Subject:  [Security-announce] NEW VMSA-2015-0006 - VMware vCenter Server updates address a LDAP certificate validation issue

--===============0129174904920920763==
Content-Language: en-US
Content-Type: multipart/signed;
	boundary="Apple-Mail=_AC09E8DA-530E-4D38-B9AF-D0FEB7A88BCC";
	protocol="application/pgp-signature"; micalg=pgp-sha1

--Apple-Mail=_AC09E8DA-530E-4D38-B9AF-D0FEB7A88BCC
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=us-ascii

------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2015-0006
Synopsis:    VMware vCenter Server updates address a LDAP certificate
             validation issue

Issue date:  2015-09-16
Updated on:  2015-09-16
CVE number:  CVE-2015-6932
------------------------------------------------------------------------

1. Summary

   VMware vCenter Server updates address a LDAP certificate validation
   issue.


2. Relevant Releases

   VMware vCenter Server prior to version 6.0 update 1
   VMware vCenter Server prior to version 5.5 update 3


3. Problem Description

    VMware vCenter Server LDAP certificate validation vulnerability

    VMware vCenter Server does not validate the certificate when binding
    to an LDAP server using TLS. Exploitation of this vulnerability may
    allow an attacker that is able to intercept traffic between vCenter
    Server and the LDAP server to capture sensitive information.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the identifier CVE-2015-6932 to this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

      VMware                        Product    Running   Replace with/
      Product                       Version    on        Apply Patch
      =============                 =======    =======   ===============
      VMware vCenter Server         6.0        Any       6.0 u1
      VMware vCenter Server         5.5        Any       5.5 u3
      VMware vCenter Server         5.1        Any       not affected
      VMware vCenter Server         5.0        Any       not affected


4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   vCenter Server
   --------------------------------
   Downloads and Documentation:
   https://www.vmware.com/go/download-vsphere



5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6932

------------------------------------------------------------------------

6. Change log

   2015-09-16 VMSA-2015-0006
   Initial security advisory.


------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2015 VMware Inc.  All rights reserved.

--Apple-Mail=_AC09E8DA-530E-4D38-B9AF-D0FEB7A88BCC
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iEYEARECAAYFAlX5pagACgkQDEcm8Vbi9kN1zQCgyROhlCksO046TFWzPT+UUC3O
EGEAoMkOB9zYI31s+wFYNERS8/bDaMQZ
=lqH1
-----END PGP SIGNATURE-----

--Apple-Mail=_AC09E8DA-530E-4D38-B9AF-D0FEB7A88BCC--

--===============0129174904920920763==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
http://lists.vmware.com/mailman/listinfo/security-announce

--===============0129174904920920763==--
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC