AOH :: HP Unsorted V :: B1A-1528.HTM

VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities



VMSA-2010-0012 VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities
VMSA-2010-0012 VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2010-0012
Synopsis:          VMware vCenter Update Manager fix for Jetty Web
                   server addresses important security vulnerabilities
Issue date:        2010-07-19
Updated on:        2010-07-19 (initial release of advisory)
CVE numbers:       CVE-2009-1523 CVE-2009-1524
- ------------------------------------------------------------------------

1. Summary

    VMware vCenter Update Manager fix for Jetty Web server addresses
    important security vulnerabilities.

2. Relevant releases

    VMware vCenter Update Manager 1.0
    VMware vCenter Update Manager 4.0
    VMware vCenter Update Manager 4.1

3. Problem Description

 a. VMware vCenter Update Manager Jetty Web server vulnerabilities

    VMware vCenter Update Manager is an automated patch management
    solution for VMware ESX hosts and Microsoft virtual machines. Update
    Manager embeds the Jetty Web server which is a third party
    component.

    The default version of the Jetty Web server in Update Manager is
    version 6.1.6 for which the following relevant vulnerabilities are
    reported.

    A directory traversal vulnerability in Jetty allows for obtaining
    files from the system where Update Manager is installed by a remote,
    unauthenticated attacker. The attacker would need to be on the same
    network as the system where Update Manager is installed.

    A cross-site scripting vulnerability in Jetty allows for running
    JavaScript in the browser of the user who clicks a URL containing a
    malicious request to Update Manager. For an attack to be successful
    the attacker would need to lure the user into clicking the malicious
    URL.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2009-1523 and CVE-2009-1524 to these issues.

    VMware would like to thank Claudio Criscione of Secure Network for
    reporting these issues to us.

    Column 4 of the following table lists the action required to
    remediate the vulnerabilities in each release, if a solution is
    available.  

    VMware           Product  Running  Replace with/
    Product          Version  on       Apply Patch
    ==============   =======  =======  ================    Update Manager       1.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.0  Windows  Update Manager fix for Jetty *
    Update Manager       4.1  Windows  Update Manager fix for Jetty *

    * Refer to VMware Knowledge Base article 1023962

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   VMware vCenter Update Manager
   -----------------------------
   Update Manager fix for Jetty
http://kb.vmware.com/kb/1023962 

5. References

   CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1523 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1524 

- ------------------------------------------------------------------------
6. Change log

2010-07-19  VMSA-2010-0012
Initial security advisory after release of VMware vCenter Update Manager
security fix for the Jetty Web server on 2010-07-19.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce 

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055 

VMware Security Center
http://www.vmware.com/security 

VMware security response policy
http://www.vmware.com/support/policies/security_response.html 

General support life cycle policy
http://www.vmware.com/support/policies/eos.html 

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html 

Copyright 2010 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFMRHzZS2KysvBH1xkRAmGOAJ9NP3RuHj2w4mwu3saJFdjce+PrqwCfXhLk
kQ3DQOJquo4Ymo7foPajEwY=iZyn
-----END PGP SIGNATURE-----


The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.