VMSA-2016-0020:vRealize Operations update addresses REST API deserialization vulnerability

VMware Tanzu Application Service

0 more products

23498

13 November 2016

13 November 2016

CLOSED

CRITICAL

CVE-2016-7462

VMSA-2016-0020

vRealize Operations update addresses REST API deserialization vulnerability.

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
 VMSA-2016-0020
VMware Security Advisory Severity:
 Important
VMware Security Advisory Synopsis:
 vRealize Operations update addresses REST API deserialization vulnerability
VMware Security Advisory Issue date:
 2016-11-15
VMware Security Advisory Updated on:
 2016-11-15 (Initial Advisory)
VMware Security Advisory CVE numbers:
 CVE-2016-7462
 
1. Summary

vRealize Operations update addresses REST API deserialization vulnerability.

 
2. Relevant Products
  • vRealize Operations
  •  
3. Problem Description

a. vRealize Operations REST API deserialization vulnerability

 

vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content   and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be  chosen. Overwriting files is not feasible.  

 

VMware would like to thank Jacob Baines of Tenable Network Security for reporting this issue to us.  

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7462 to this issue.  

 

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware ProductvRealize Operations
Product Version6.x
Running on Any
SeverityImportant
Replace with/ Apply Patch6.4.0
Mitigation/ WorkaroundNone
VMware ProductvRealize Operations
Product Version5.x
Running on Any
SeverityN/A
Replace with/ Apply PatchNot affected
Mitigation/ WorkaroundN/A

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

vRealize Operations
Downloads and Documentation:
https://my.vmware.com/en/web/vmware/info/slug/infrastructure_operations_management/vmware_vrealize_operations/6_4

 

6. Change log

 

2016-11-15 VMSA-2016-0020  

Initial security advisory in conjunction with the release of  vRealize Operations 6.4 on 2016-11-15.

 

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

[email protected]

[email protected]

[email protected]

 

E-mail: [email protected]

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2016 VMware Inc. All rights reserved.