SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware vCenter Vendors:   VMware
(VMware Issues Fix for VMware vCenter Server) Adobe LiveCycle Data Services XML Processing Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System
SecurityTracker Alert ID:  1034182
SecurityTracker URL:  http://securitytracker.com/id/1034182
CVE Reference:   CVE-2015-3269   (Links to External Site)
Date:  Nov 19 2015
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.0 prior to 5.0 update u3e, 5.1 prior to 5.1 update u3b, 5.5 prior to 5.5 update 3
Description:   A vulnerability was reported in Adobe LiveCycle Data Services. A remote user can obtain potentially sensitive information on the target system. VMware vCenter Server is affected.

A remote user can send specially crafted XML data to obtain potentially sensitive information from the target system.

Matthias Kaiser of Code White reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive information on the target system.
Solution:   VMware has issued a fix for CVE-2015-3269 for VMware vCenter Server (5.0 update u3e, 5.1 update u3b, 5.5 update 3).

The VMware advisory is available at:

http://www.vmware.com/security/advisories/VMSA-2015-0008.html

Vendor URL:  www.vmware.com/security/advisories/VMSA-2015-0008.html (Links to External Site)
Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 20 2015 Adobe LiveCycle Data Services XML Processing Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC