Secunia Security Advisory - VMware has issued an update for multiple vMA packages. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), or gain escalated privileges, and by malicious people to bypass certain security restrictions, poison the DNS cache, cause a DoS, or compromise a user's system.
9d9c2ad08ea6ef7003e208b71b1ce116a75f07da5c34c1abb8f5097b57168004
----------------------------------------------------------------------
Use WSUS to deploy 3rd party patches
Public BETA
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
VMware vMA Update for Multiple Packages
SECUNIA ADVISORY ID:
SA38794
VERIFY ADVISORY:
http://secunia.com/advisories/38794/
DESCRIPTION:
VMware has issued an update for multiple vMA packages. This fixes
some security issues and vulnerabilities, which can be exploited by
malicious, local users to disclose sensitive information, bypass
certain security restrictions, cause a DoS (Denial of Service), or
gain escalated privileges, and by malicious people to bypass certain
security restrictions, poison the DNS cache, cause a DoS, or
compromise a user's system.
For more information:
SA32127
SA32346
SA33338
SA34079
SA34267
SA34631
SA35128
SA36425
SA36617
SA36707
SA36810
SA36866
SA37086
SA37233
SA37426
SA37629
SOLUTION:
Apply vMA 4.0 Patch 3.
ORIGINAL ADVISORY:
VMSA-2010-0004:
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
OTHER REFERENCES:
SA32127:
http://secunia.com/advisories/32127/
SA32346:
http://secunia.com/advisories/32346/
SA33338:
http://secunia.com/advisories/33338/
SA34079:
http://secunia.com/advisories/34079/
SA34267:
http://secunia.com/advisories/34267/
SA34631:
http://secunia.com/advisories/34631/
SA35128:
http://secunia.com/advisories/35128/
SA36425:
http://secunia.com/advisories/36425/
SA36617:
http://secunia.com/advisories/36617/
SA36707:
http://secunia.com/advisories/36707/
SA36810:
http://secunia.com/advisories/36810/
SA36866:
http://secunia.com/advisories/36866/
SA37086:
http://secunia.com/advisories/37086/
SA37233:
http://secunia.com/advisories/37233/
SA37426:
http://secunia.com/advisories/37426/
SA37629:
http://secunia.com/advisories/37629/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------