VirtualCenter addresses User Account Disclosure Vulnerability

2008-08-15 / 2008-08-16
Credit: VMware
Risk: Medium
Local: No
Remote: Yes


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2008-0012 Synopsis: Updated VirtualCenter addresses User Account Disclosure Vulnerability Issue date: 2008-08-12 Updated on: 2008-08-12 (initial release of advisory) CVE numbers: CVE-2008-3514 - ------------------------------------------------------------------------ 1. Summary Updated VirtualCenter addresses User Account Disclosure Vulnerability 2. Relevant releases VirtualCenter 2.5 previous to Update 2 VirutalCenter 2.0.2 previous to Update 5 3. VirtualCenter User Account Disclosure Vulnerability An information disclosure vulnerability is present in VirtualCenter. Exploitation of this flaw might result in disclosure of the user names of system accounts. VMware would like to thank Brett Moore of Insomnia Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-3514 to this issue. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter 2.5 Windows VirtualCenter 2.5 Update 2 VirtualCenter 2.0.2 Windows VirtualCenter 2.0.2 Update 5 hosted * any any not applicable ESX(i) any ESX(i) not applicable ESX any ESX not applicable * hosted products are VMware Workstation, Player, ACE, Server, Fusion 4. Solution Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file. VirtualCenter ------------- VMware VirtualCenter 2.5 Update 2 build 104263 http://www.vmware.com/download/download.do?downloadGroup=VC250U2 DVD iso image md5sum: 83de404fa073bc1fde9acd080f21e688 Zip file md5sum: 3297f1e47c6b018ac8190f11bd022d5b Release Notes http://www.vmware.com/support/vi3/doc/vi3_esx35u2_vc25u2_rel_notes.html VMware VirtualCenter 2.0.2 Update 5 build 104182 http://www.vmware.com/downloads/download.do?downloadGroup=VC202U5 DVD iso image md5sum: 5fee5d2d97b482e0d0cb47da7d8e7c34 Zip file md5sum: cd468aab309745c12ee5516652aafbcb Release Notes http://www.vmware.com/support/vi3/doc/releasenotes_vc202u5.html 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3514 - ------------------------------------------------------------------------ 6. Change log 2008-08-12 VMSA-2008-0012 Initial release following release of VirtualCenter 2.0.2 Update 5 - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2008 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8 wj8DBQFIodHdS2KysvBH1xkRAq/dAJ4lBpKFSw2DlU43Sh6jV2f0pngzKACePNjq 1RqaLJvXgSJxV3kOsxgsIck= =djy1 -----END PGP SIGNATURE-----

References:

http://www.vmware.com/support/vi3/doc/releasenotes_vc202u5.html
http://www.securityfocus.com/bid/30664
http://www.securityfocus.com/archive/1/archive/1/495386/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top