exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2016-0016

VMware Security Advisory 2016-0016
Posted Oct 12, 2016
Authored by VMware | Site vmware.com

VMware Security Advisory 2016-0016 - vRealize Operations (vROps) updates address privilege escalation vulnerability.

tags | advisory
advisories | CVE-2016-7457
SHA-256 | 5915d300c8e1866b0876811067bb4b472df255f41cda6a8833d41d56bd18bbcc

VMware Security Advisory 2016-0016

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------------
- ---
VMware Security Advisory

Advisory ID: VMSA-2016-0016
Severity: Critical
Synopsis: vRealize Operations (vROps) updates address privilege
escalation
vulnerability
Issue date: 2016-10-11
Updated on: 2016-10-11 (Initial Advisory)
CVE number: CVE-2016-7457

1. Summary

vRealize Operations (vROps) updates address privilege escalation
vulnerability.

2. Relevant Products

vRealize Operations (vROps)

3. Problem Description

vROps privilege escalation issue

vROps contains a privilege escalation vulnerability. Exploitation of
this
issue may allow a vROps user who has been assigned a low-privileged role
to
gain full access over the application. In addition it may be possible to
stop and delete Virtual Machines managed by vCenter.

VMware would like to thank Edgar Carvalho for reporting this issue to
us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2016-7457 to this issue.

Column 5 of the following table lists the action required to remediate
the
vulnerability in each release, if a solution is available.

VMware Product Running Replace with/
Product Version on Severity Apply Patch Workaround
============ ========= ======= ======== ================ ==========
vRealize 6.3.0 Any Critical patch pending KB2147215
Operations
vRealize 6.2.1 Any Critical patch pending KB2147247
Operations
vRealize 6.2.0a Any Critical patch pending KB2147246
Operations
vRealize 6.1.0 Any Critical patch pending KB2147248
Operations
vRealize 6.0.x Any N/A not affected N/A
Operations
vRealize 5.x Any N/A not affected N/A
Operations

4. Solution

Please review the patch/release notes for your product and version and
verify the checksum of your downloaded file.

vRealize Operations
Downloads and Documentation:

https://my.vmware.com/en/web/vmware/info/slug/infrastructure_operations_man
agement/vmware_vrealize_operations/6_3

5. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7457
https://kb.vmware.com/kb/2147215
https://kb.vmware.com/kb/2147247
https://kb.vmware.com/kb/2147246
https://kb.vmware.com/kb/2147248

- ------------------------------------------------------------------------

6. Change log

2016-10-11 VMSA-2016-0016 Initial security advisory in conjunction with
the
release of vROps patches on 2016-10-11.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security at vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC

Copyright 2016 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFX/S0YDEcm8Vbi9kMRAhh7AJ0ctS7c+oxpaQCNvEx+SpVM5fawZACfYvPA
IhRXucua8IjVJBRr8/z45wg=
=JUi8
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close