Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: VMWare :: bt-21596.htm

VMware Studio 2.0 addresses a security issue in the public beta version of Studio 2.0



VMSA-2009-0011 VMware Studio 2.0 addresses a security issue in the public beta version of Studio 2.0
VMSA-2009-0011 VMware Studio 2.0 addresses a security issue in the public beta version of Studio 2.0



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID:       VMSA-2009-0011
Synopsis:          VMware Studio 2.0 addresses a security issue in the
                   public beta version of Studio 2.0
Issue date:        2009-08-31
Updated on:        2009-08-31 (initial release of advisory)
CVE numbers:       CVE-2009-2968
- ------------------------------------------------------------------------

1. Summary

   VMware Studio 2.0 resolves a directory traversal vulnerability that
   was present in the VMware Studio 2.0 public beta.

2. Relevant releases

   VMware VMware Studio 2.0 public beta

3. Problem Description

 a. Directory traversal vulnerability

    Due to incomplete sanitation of user input, a support component of
    VMware Studio's web interface can be tricked into uploading a file
    to any directory inside the VMware Studio virtual appliance.  This
    issue does not affect virtual machines that are created with Studio
    2.0 beta.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2009-2968 to this issue.

    VMware would like to thank Claudio Criscione of Secure Network
    for reporting this issue to us.

    VMware         Product   Running  Replace with/
    Product        Version   on       Apply Patch
    =============  ========  =======  ================    VMware Studio  1.0       VMware   not affected
    VMware Studio  2.0 beta  VMware   VMware Studio 2.0 build 1017-185256
    VMware Studio  2.0       VMware   not affected

4. Solution

   Please review the patch/release notes for your product and version
   and verify the sha1sum and/or the md5sum of your downloaded file.

   VMware Studio 2.0 build 1017-185256
   -----------------------------------
http://www.vmware.com/support/developer/studio/ 
   Release notes:
http://www.vmware.com/support/developer/studio/studio20/release_notes.html 

   VMware Studio appliance in ZIP
    (md5sum:58cb40704d12f4ec329b887ae729aba9)
    (sha1sum:2931a6a4de7e77016d08c6539cab93a6304ab452)

   VMware Studio appliance in OVA
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ova 
    (md5sum:0b0edb02865ae935bcffcccbf346adc2)
    (sha1sum:f126339ab0de5b684e60ab7dfd50ddb15f2391cc)

   VMware Studio appliance in OVF 1.0
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ovf 
    (md5sum:a3dfca29578a75b0440be3419396c85c)
    (sha1sum:67f08e73de18ddeea257fefe6475f289d643ad77)

   VMware Studio appliance in OVF 0.9
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF09.ovf 
    (md5sum:959c61270dc872be2f5e65e59480852d)
    (sha1sum:ac3c2d612f0b877f10ca607467b6a95b31ed3dd7)

   VMDK associated to the OVF 1.0 and OVF 0.9 descriptor
    (md5sum:617ec59063d2ba180b19f680fb1b49b1)
    (sha1sum:eb1d474cde175a9e042c9613eae31822843394cf)

   VMware Studio Plugin for Eclipse in ZIP
    (md5sum:9970df718f08f92c053758187c979293)
    (sha1sum:2d5a9a8d3d68faa3afd317b148f060a74cbd359a)


5. References

   CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2968 

- ------------------------------------------------------------------------
6. Change log

2009-08-31  VMSA-2009-0011
Initial security advisory after release of Studio 2.0 on 2009-08-31.

- ------------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce 

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055 

VMware Security Center
http://www.vmware.com/security 

VMware security response policy
http://www.vmware.com/support/policies/security_response.html 

General support life cycle policy
http://www.vmware.com/support/policies/eos.html 

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html 

Copyright 2009 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iD8DBQFKnLHmS2KysvBH1xkRAlUSAJ90vZzWYrMUgNwmnk1EWRTEyF+pKgCffeLt
sMSBGdvumE+14/pi4woV46Q=jbNX
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH