VMSA-2010-0012:VMware vCenter Update Manager fix for Jetty Web server addresses HIGH security vulnerabilities

VMware

0 more products

23381

17 July 2010

17 July 2010

CLOSED

CRITICAL

CVE-2009-1523,CVE-2009-1524

VMSA-2010-0012.2

VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
VMSA-2010-0012.2
VMware Security Advisory Synopsis:
VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities
VMware Security Advisory Issue date:
2010-07-19
VMware Security Advisory Updated on:
2011-05-05
VMware Security Advisory CVE numbers:
CVE-2009-1523 CVE-2009-1524
 
1. Summary

VMware vCenter Update Manager fix for Jetty Web server addresses important security vulnerabilities.

 

2. Relevant releases

VMware vCenter Update Manager 4.1
VMware vCenter Update Manager 4.0
VMware vCenter Update Manager 1.0

 
3. Problem Description

a. VMware vCenter Update Manager Jetty Web server vulnerabilities
VMware vCenter Update Manager is an automated patch management solution for VMware ESX hosts and Microsoft virtual machines. Update Manager embeds the Jetty Web server which is a third party component.

The default version of the Jetty Web server in Update Manager is version 6.1.6 for which the following relevant vulnerabilities are reported.

A directory traversal vulnerability in Jetty allows for obtaining files from the system where Update Manager is installed by a remote, unauthenticated attacker. The attacker would need to be on the same network as the system where Update Manager is installed.

A cross-site scripting vulnerability in Jetty allows for running JavaScript in the browser of the user who clicks a URL containing a malicious request to Update Manager. For an attack to be successful the attacker would need to lure the user into clicking the malicious URL.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-1523 and CVE-2009-1524 to these issues.

VMware would like to thank Claudio Criscione of Secure Network for reporting these issues to us.

Column 4 of the following table lists the action required to remediate the vulnerabilities in each release, if a solution is available.

VMware Product ==============
Product Version =======
Running on =======
Replace with/ Apply Patch =================
VMware Product ============== Update Manager
Product Version ======= 4.1
Running on ======= Windows
Replace with/ Apply Patch ================= Update 1
VMware Product ============== Update Manager
Product Version ======= 4.0
Running on ======= Windows
Replace with/ Apply Patch ================= Update 3
VMware Product ============== Update Manager
Product Version ======= 1.o
Running on ======= Windows
Replace with/ Apply Patch ================= Update Manager fix for Jetty *


* Refer to VMware Knowledge Base article 1023962 for a workaround.

4. Solution

Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.

VMware vCenter Update Manager 4.1 Update 1
---------------------------------

http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0
Release Notes:

http://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.html

File type: .iso
md5sum: 729cf247aa5d33ceec431c86377eee1a
sha1sum: c1e10a5fcbc1ae9d13348d43541d574c563d66f0

File type: .zip
md5sum: fd1441bef48a153f2807f6823790e2f0
sha1sum: 31737a816ed1c08ab3a505fb6db2483f49ad7c19

VMware vCenter Update Manager 4.0 Update 3
---------------------------------
http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0


Release Notes:

http://www.vmware.com/support/vsphere4/doc/vsp_vc40_u3_rel_notes.html

File type: .iso
md5sum: b04780df75f70621d0c8794e8773a983
sha1sum: a9f1398306158572ea1c3d202ed8c6ad922e0764

File type: .zip
md5sum: bc8179a639dcc6563d7dbf968095edc7
sha1sum: 61b6dbb1bcf3aa74503e183317a00733b0253faa

VMware vSphere Client
File type: .exe
md5sum: 1b90081e422358c407ad9696c70c70f7
sha1sum: 7ba9043421f8b529b0da08fa83458069ccac0fe9

VMware vCenter Update Manager Workaround
----------------------------------------
Update Manager fix for Jetty
http://kb.vmware.com/kb/1023962

 
6. Change log

2010-07-19 VMSA-2010-0012 Initial security advisory after release of VMware vCenter Update Manager security fix for the Jetty Web server on 2010-07-19.

2011-02-10 VMSA-2010-0012.1 Updated security advisory in conjunction with the release of VMware vCenter Update Manager 4.1 Update 1 on 2011-02-10.

2011-05-05 VMSA-2010-0012.2 Updated security advisory in conjunction with the release of VMware vCenter Update Manager 4.0 Update 3 on 2011-05-05.

 

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  • security-announce at lists.vmware.com
  • bugtraq at securityfocus.com
  • full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com
PGP key at:
http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2011 VMware Inc. All rights reserved.