exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2012-0011

VMware Security Advisory 2012-0011
Posted Jun 14, 2012
Authored by VMware | Site vmware.com

VMware Security Advisory 2012-0011 - VMware Workstation, Player, Fusion, ESXi and ESX patches address security issues.

tags | advisory
advisories | CVE-2012-3288, CVE-2012-3289
SHA-256 | 509ed4ca1d4de84e168a83b909f8884b5902694169ccc6d01433140a39e2a9ed

VMware Security Advisory 2012-0011

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

-----------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2012-0011
Synopsis: VMware hosted products and ESXi and ESX patches address
security issues
Issue date: 2012-06-14
Updated on: 2012-06-14 (initial advisory)
CVE numbers: CVE-2012-3288, CVE-2012-3289
-----------------------------------------------------------------------
1. Summary

VMware Workstation, Player, Fusion, ESXi and ESX patches address
security issues.

2. Relevant releases

Workstation 8.0.3
Workstation 7.1.5

Player 4.0.3
Player 3.1.5

Fusion 4.1.2

ESXi 5.0 without patch ESXi500-201206401-SG
ESXi 4.1 without patch ESXi410-201206401-SG
ESXi 4.0 without patch ESXi400-201206401-SG
ESXi 3.5 without patch ESXe350-201206401-I-SG

ESX 4.1 without patch ESX410-201206401-SG
ESX 4.0 without patch ESX400-201206401-SG
ESX 3.5 without patch ESX350-201206401-SG

3. Problem Description

a. VMware Host Checkpoint file memory corruption

Input data is not properly validated when loading Checkpoint files.
This may allow an attacker with the ability to load a specially
crafted Checkpoint file to execute arbitrary code on the host.

Workaround
- None identified

Mitigation
- Do not import virtual machines from untrusted sources.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-3288 to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected

Workstation 8.x any 8.0.4 or later
Workstation 7.x any 7.1.6 or later

Player 4.x any 4.0.4 or later
Player 3.x any 3.1.6 or later

Fusion 4.x Mac OS/X 4.1.3 or later

ESXi 5.0 ESXi ESXi500-201206401-SG
ESXi 4.1 ESXi ESXi410-201206401-SG
ESXi 4.0 ESXi ESXi400-201206401-SG
ESXi 3.5 ESXi ESXe350-201206401-I-SG

ESX 4.1 ESX ESX410-201206401-SG
ESX 4.0 ESX ESX400-201206401-SG
ESX 3.5 ESX ESX350-201206401-SG

b. VMware Virtual Machine Remote Device Denial of Service

A device (e.g. CD-ROM, keyboard) that is available to a virtual
machine while physically connected to a system that does not run the
virtual machine is referred to as a remote device.

Traffic coming from remote virtual devices is incorrectly handled.
This may allow an attacker who is capable of manipulating the
traffic from a remote virtual device to crash the virtual machine.

Workaround
- None identified

Mitigation
- Users need administrative privileges on the virtual machine
in order to attach remote devices.
- Do not attach untrusted remote devices to a virtual machine.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2012-3289 to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected

Workstation 8.x any 8.0.4 or later
Workstation 7.x any not affected

Player 4.x any 4.0.4 or later
Player 3.x any not affected

Fusion 4.x Mac OS/X not affected

ESXi 5.0 ESXi ESXi500-201206401-SG
ESXi 4.1 ESXi ESXi410-201206401-SG
ESXi 4.0 ESXi ESXi400-201206401-SG
ESXi 3.5 ESXi ESXe350-201206401-I-SG

ESX 4.1 ESX ESX410-201206401-SG
ESX 4.0 ESX ESX400-201206401-SG
ESX 3.5 ESX ESX350-201206401-SG


4. Solution

Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.

Workstation 8.0.4
-----------------
http://www.vmware.com/go/downloadworkstation

Release notes:

https://www.vmware.com/support/ws80/doc/releasenotes_workstation_804.html

VMware Workstation for Windows 32-bit and 64-bit with VMware Tools
md5sum: 9c74d5468d693714d2b6c616fd416e54
sha1sum: d542e1ac1a4df062ed6029fabf5f30750234a3b9

VMware Workstation for Linux 32-bit with VMware Tools
md5sum: 1c340ba2cef564fd52460cee46bfaa06
sha1sum: 8d99595b5f7f020e51aad8ba373b0f09e8d0aba2

VMware Workstation for Linux 64-bit with VMware Tools
md5sum: de0ea94362f9c044bb4a03682dee2d05
sha1sum: 04aa91f0bb4f51b024ed88939ecd9bb6d7efefe4

Workstation 7.1.6
-----------------
http://www.vmware.com/go/downloadworkstation

Release notes:
https://www.vmware.com/support/ws71/doc/releasenotes_ws716.html

VMware Workstation for Windows 32-bit and 64-bit with VMware Tools
md5sum: f7856421babd716dace2f0250ae271f7
sha1sum: 9eaf4b17afec36b8a166bad81be851bd8cfda709

VMware Workstation for Linux 32-bit with VMware Tools
md5sum: 18cc162a88d66a78a0114550517cd42d
sha1sum: 5a1ea9c841a2f45c2e2ed07a30b01c18c85f2133

VMware Workstation for Linux 64-bit with VMware Tools
md5sum: c11e4e162fc128cbfe629c8fb60ea733
sha1sum: 627698ac32d039bcafc117f0fb71d7e666ac0c2e

Player 4.0.4
------------
http://www.vmware.com/go/downloadplayer

Release notes:
https://www.vmware.com/support/player40/doc/releasenotes_player404.html

VMware Player for Windows 32-bit and 64-bit
md5sum: 9fea9628b54bba02c173b8dae2e0e77e
sha1sum: 9dea11046392555cd6b00c8eb7b4135c3ca143b7

VMware Player for Linux 32-bit
md5sum: 3f0aae6170e075ec7b042b931e97bdac
sha1sum: 595f73ced1f8dc2804d89ebfee98edeb561ff94d

VMware Player for Linux 64-bit
md5sum: 825633b7031578203104081f1a132b09
sha1sum: e6b5919a822bfc66bf2cc9a52e62532433014c80

Player 3.1.6
------------
http://www.vmware.com/go/downloadplayer

Release notes:
https://www.vmware.com/support/player31/doc/releasenotes_player316.html

VMware Player for Windows 32-bit and 64-bit
md5sum: 258ca5ac40efa389b0bb221191dbdd65
sha1sum: 691beccb590b7bc34461f78946d752288f2ef4e7

VMware Player for Linux 32-bit
md5sum: 9ed2d89816523ba030f8877c3fb935b9
sha1sum: a16a91dddb6081be314ef5d84708d37fabdd859c

VMware Player for Linux 64-bit
md5sum: d0715a06775c0f92b9d23e031e4af1c6
sha1sum: 5033c1bfecb309b96399410e614c41452c49e8e8

Fusion 4.1.3
------------
http://www.vmware.com/go/downloadfusion

Release Notes:
http://www.vmware.com/support/fusion4/doc/releasenotes_fusion_413.html

VMware Fusion (for Intel-based Macs)
md5sum: 1581b2f1cc0e28f9980c48bab59072bd
sha1sum: f2f58d0b3bfa405c4e6d9f61d51e0d689f8ed34c

ESXi and ESX
------------
http://downloads.vmware.com/go/selfsupport-download

ESXi 5.0
--------
ESXi500-201206001
md5sum: 41299e3e0798220372ecd2c334e109bc
sha1sum: f4309df6f6a0c876f496b324b16ff911e7907a40
http://kb.vmware.com/kb/2021031
ESXi500-201206001 contains ESXi500-201206401-SG

ESXi 4.1
--------
ESXi410-201206001
md5sum: c0b4c3aad0b7c77b3a586b0806d8b44e
sha1sum: f6dd511b1eb257efdadfc608a70c6f3cda4e4b4a
http://kb.vmware.com/kb/2019243
ESXi410-201206001 contains ESXi410-201206401-SG

ESXi 4.0
--------
ESXi400-201206001
md5sum: e24762b6fa13c725f1739a9cea437949
sha1sum: 822582de9c3791c6face7ed0fc3d8dc2f29322c0
http://kb.vmware.com/kb/2021027
ESXi400-201206001 contains ESXi410-201206401-SG

ESXi 3.5
--------
ESXe350-201206401-O-SG
md5sum: f553524860896eb3f9095740fb48ae53
sha1sum: 70ec5bd7bad523b84f635031c99dd48fa378254b
http://kb.vmware.com/kb/2021018
ESXe350-201206401-O-SG contains ESXe350-201206401-I-SG

ESX 4.1
-------
ESX410-201206001
md5sum: 532aa0474f36649a74921adf14c8739b
sha1sum: 8baabd80dc27bb4e705df63683c0be3af0ac5431
http://kb.vmware.com/kb/2019065
ESX410-201206001 contains ESX410-201206401-SG

ESX 4.0
-------
ESX400-201206001
md5sum: ca60db82c5a3a5c6128f5805fa34f121
sha1sum: ff5aa11d5d4e1f4788483c7e60cbd828a0d6f7c1
http://kb.vmware.com/kb/2021025
ESX400-201206001 contains ESX400-201206401-SG

ESX 3.5
-------
ESX350-201206401-SG
md5sum: 065f9e2c78fea243c640e9757743a2ab
sha1sum: 2438decf074a270067f58837efda10670a8955aa
http://kb.vmware.com/kb/2021017


5. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3289

-----------------------------------------------------------------------

6. Change log

2012-06-14 VMSA-2012-0011
Initial security advisory in conjunction with the release of
Workstation 7.1.6, Player 3.1.6, ACE 2.7.6, Workstation 8.0.4,
Player 4.0.4, Fusion 4.1.3 and patches for ESXi and ESX 3.5,
4.0, 4.1 and 5.0 on 2012-06-14

-----------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2012 VMware Inc. All rights reserved

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFP2W/0DEcm8Vbi9kMRApVwAKDnOjNBK4qIwLM+WR1HJhiYBn+GHwCgpJRN
MLNMgyRdkDcEo4eYgM1SEi8=
=SoME
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close