TITLE: VMware ESX Server Three Vulnerabilities SECUNIA ADVISORY ID: SA13871 VERIFY ADVISORY: http://secunia.com/advisories/13871/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of system information, Exposure of sensitive information, System access WHERE: >From local network OPERATING SYSTEM: VMware ESX Server 1.x http://secunia.com/product/1440/ VMware ESX Server 2.x http://secunia.com/product/2125/ DESCRIPTION: VMware has acknowledged some vulnerabilities in ESX Server, which can be exploited to disclose sensitive information in kernel memory, bypass certain security restrictions, and potentially compromise a vulnerable system. 1) A "ssl_log()" related format string error within the mod_proxy hook functions may potentially allow arbitrary code execution. For more information: SA12077 Successful exploitation requires that mod_proxy is enabled (not default setting). 2) Some race conditions and conversion errors within the Linux kernel when handling 64-bit file offset pointers may disclose large portions of kernel memory. For more information: SA12210 3) An error in mod_ssl allows clients to access a location using any cipher suite allowed by the virtual host configuration even though access to that location has been configured to require a specific set of cipher suites. For more information: SA12787 SOLUTION: Update to version 2.5 or apply security update. VMware ESX Server 2.1.2 Patch 1 Security Update: http://www.vmware.com/download/esx/esx212-10921update.html VMware ESX Server 2.0.1 Patch 1 Security Update: http://www.vmware.com/download/esx/esx201-11429update.html VMware ESX Server 1.5.2 Patch 6 Security Update: http://www.vmware.com/download/esx/esx152-10816update.html OTHER REFERENCES: SA12077: http://secunia.com/advisories/12077/ SA12210: http://secunia.com/advisories/12210/ SA12787: http://secunia.com/advisories/12787/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------