exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2011-0002

VMware Security Advisory 2011-0002
Posted Feb 8, 2011
Authored by VMware | Site vmware.com

VMware Security Advisory 2011-0002 - Updated versions of the Cisco Nexus 1000V virtual switch address a denial of service in VMware ESX/ESXi.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2011-0355
SHA-256 | f7fb2874766eafff4cbc31b572f60590002f62083f57c442c95b8355c3c13bda

VMware Security Advisory 2011-0002

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2011-0002
Synopsis: Cisco Nexus 1000V VEM updates address denial of
service in VMware ESX/ESXi
Issue date: 2011-02-07
Updated on: 2011-02-07 (initial release of advisory)
CVE numbers: CVE-2011-0355
- ------------------------------------------------------------------------

1. Summary

Updated versions of the Cisco Nexus 1000V virtual switch address a
denial
of service in VMware ESX/ESXi.

2. Relevant releases

The following VMware products could be affected by a denial of service
vulnerability that is present in older versions of the Cisco Nexus
1000V virtual switch:

- ESXi 4.1
- ESXi 4.0
- ESX 4.1
- ESX 4.0

The following Cisco products have the vulnerability:

- Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3b)
- Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3a)
- Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3)
- Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(2)
- Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(1)

3. Problem Description

a. Cisco Nexus 1000V Virtual Ethernet Module denial of service

The Cisco Nexus 1000V Virtual Ethernet Module (VEM) is a virtual
switch for ESX and ESXi. This switch can be added to ESX and ESXi
where it replaces the VMware virtual switch and runs as part of the
ESX and ESXi kernel.

A flaw in the handling of dropped packets by Cisco Nexus 1000V VEM
can cause ESX and ESXi to crash.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2011-0355 to the issue.

The issue is addressed by Cisco in the following releases:
- Cisco Nexus 1000V Virtual Ethernet Module Release 4.2(4) SV1(4)
- Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3c)
For details refer to the release notes of these releases (see
section 4 for links).

VMware customers are only affected by this vulnerability if they
have chosen to deploy the Cisco Nexus 1000V virtual switch as a
replacement for the VMware vNetwork Standard Switch or the VMware
vNetwork Distributed Switch.

VMware has confirmed that the VMware vNetwork Standard Switch and
the VMware vNetwork Distributed Switch are not affected by the
vulnerability.

The issue is documented by Cisco in Cisco bug ID CSCtj17451 (see
section 5 for a link).

4. Solution

Cisco Nexus 1000V Virtual Ethernet Module Release 4.2(1) SV1(4)
---------------------------------------------------------------
Release notes

http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_2_1_s_v_
1_4/release/notes/n1000v_rn.html

Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3c)
----------------------------------------------------------------
Release notes

http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_
1_3_c/release/notes/n1000v_rn.html

5. References

CVE numbers
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0355

Cisco bug ID CSCtj17451 (registered Cisco customers only)

http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fe
tchBugDetails&bugId=CSCtj17451

- ------------------------------------------------------------------------

6. Change log

2011-02-07 VMSA-2011-0002
Initial security advisory in conjunction with the release of Cisco Nexus
1000V Virtual Ethernet Module 1.3c on 2011-02-04.

- -----------------------------------------------------------------------
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFNUNTIS2KysvBH1xkRAk1hAJ9iH1j58lM5KrwVaRYccSN3rWaw/wCePyLP
FHYGA7W1DEcKcOFWj7GkuHE=
=srWD
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close