VMSA-2014-0012 : VMware vSphere product updates address security vulnerabilities

medium Nessus Plugin ID 79762

Synopsis

The remote VMware ESXi host is missing a security-related patch.

Description

a. VMware vCSA cross-site scripting vulnerability

VMware vCenter Server Appliance (vCSA) contains a vulnerability that may allow for Cross Site Scripting. Exploitation of this vulnerability in vCenter Server requires tricking a user to click on a malicious link or to open a malicious web page.

VMware would like to thank Tanya Secker of Trustwave SpiderLabs for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-3797 to this issue.

b. vCenter Server certificate validation issue

vCenter Server does not properly validate the presented certificate when establishing a connection to a CIM Server residing on an ESXi host. This may allow for a Man-in-the-middle attack against the CIM service.

VMware would like to thank The Google Security Team for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2014-8371 to this issue.

c. Update to ESXi libxml2 package

libxml2 is updated to address multiple security issues.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2013-2877 and CVE-2014-0191 to these issues.

d. Update to ESXi Curl package

Curl is updated to address multiple security issues.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2014-0015 and CVE-2014-0138 to these issues.

e. Update to ESXi Python package

Python is updated to address multiple security issues.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2013-1752 and CVE-2013-4238 to these issues.

f. vCenter and Update Manager, Oracle JRE 1.6 Update 81

Oracle has documented the CVE identifiers that are addressed in JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update Advisory of July 2014. The References section provides a link to this advisory.

Solution

Apply the missing patch.

See Also

http://lists.vmware.com/pipermail/security-announce/2015/000287.html

Plugin Details

Severity: Medium

ID: 79762

File Name: vmware_VMSA-2014-0012.nasl

Version: 1.12

Type: local

Published: 12/6/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.1

Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version

Exploit Ease: No known exploits are available

Patch Publication Date: 12/4/2014

Reference Information

CVE: CVE-2013-1752, CVE-2013-2877, CVE-2013-4238, CVE-2014-0015, CVE-2014-0138, CVE-2014-0191, CVE-2014-3797, CVE-2014-8371

BID: 61050, 61738, 63804, 65270, 66457, 67233, 71492, 71493

VMSA: 2014-0012