what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2016-0020

VMware Security Advisory 2016-0020
Posted Nov 16, 2016
Authored by VMware | Site vmware.com

VMware Security Advisory 2016-0020 - vRealize Operations REST API deserialization vulnerability vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be chosen. Overwriting files is not feasible.

tags | advisory, denial of service, arbitrary
advisories | CVE-2016-7462
SHA-256 | 29c0a098ffb0c7b27ec0d4610115a63c7d8a7f0037d9c4fba88d83dcb2ddd668

VMware Security Advisory 2016-0020

Change Mirror Download
- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2016-0020
Severity: Important
Synopsis: vRealize Operations update addresses REST API
deserialization vulnerability
Issue date: 2016-11-15
Updated on: 2016-11-15 (Initial Advisory)
CVE number: CVE-2016-7462

1. Summary

vRealize Operations update addresses REST API deserialization
vulnerability.

2. Relevant Products

vRealize Operations

3. Problem Description

a. vRealize Operations REST API deserialization vulnerability

vRealize Operations contains a deserialization vulnerability in its
REST API implementation. This issue may result in a Denial of
Service as it allows for writing of files with arbitrary content
and moving existing files into certain folders. The name format of
the destination files is predefined and their names cannot be
chosen. Overwriting files is not feasible.

VMware would like to thank Jacob Baines of Tenable Network Security
for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2016-7462 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigations/
Product Version on Severity Apply patch Workarounds
========== ======= ======= ========= ============= ==========
vRealize 6.x Any Important 6.4.0 None
Operations

vRealize 5.x Any N/A Not affected N/A
Operations


4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

vRealize Operations
Downloads and Documentation:

https://my.vmware.com/en/web/vmware/info/slug/infrastructure_operations_man
agement/vmware_vrealize_operations/6_4

5. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7462

- ------------------------------------------------------------------------

6. Change log

2016-11-15 VMSA-2016-0020
Initial security advisory in conjunction with the release of
vRealize Operations 6.4 on 2016-11-15.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

Twitter
https://twitter.com/VMwareSRC

Copyright 2016 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFYK673DEcm8Vbi9kMRApq6AJsFxFWG9Z3SKy/NXsNyf2JyJk7tjgCffclb
GvdwHQYiTzhkm0cUV5VUnHc=
=SVBe
-----END PGP SIGNATURE-----?



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close