exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2016-0020

VMware Security Advisory 2016-0020
Posted Nov 16, 2016
Authored by VMware | Site vmware.com

VMware Security Advisory 2016-0020 - vRealize Operations REST API deserialization vulnerability vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be chosen. Overwriting files is not feasible.

tags | advisory, denial of service, arbitrary
advisories | CVE-2016-7462
SHA-256 | 29c0a098ffb0c7b27ec0d4610115a63c7d8a7f0037d9c4fba88d83dcb2ddd668

VMware Security Advisory 2016-0020

Change Mirror Download
- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2016-0020
Severity: Important
Synopsis: vRealize Operations update addresses REST API
deserialization vulnerability
Issue date: 2016-11-15
Updated on: 2016-11-15 (Initial Advisory)
CVE number: CVE-2016-7462

1. Summary

vRealize Operations update addresses REST API deserialization
vulnerability.

2. Relevant Products

vRealize Operations

3. Problem Description

a. vRealize Operations REST API deserialization vulnerability

vRealize Operations contains a deserialization vulnerability in its
REST API implementation. This issue may result in a Denial of
Service as it allows for writing of files with arbitrary content
and moving existing files into certain folders. The name format of
the destination files is predefined and their names cannot be
chosen. Overwriting files is not feasible.

VMware would like to thank Jacob Baines of Tenable Network Security
for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2016-7462 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigations/
Product Version on Severity Apply patch Workarounds
========== ======= ======= ========= ============= ==========
vRealize 6.x Any Important 6.4.0 None
Operations

vRealize 5.x Any N/A Not affected N/A
Operations


4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

vRealize Operations
Downloads and Documentation:

https://my.vmware.com/en/web/vmware/info/slug/infrastructure_operations_man
agement/vmware_vrealize_operations/6_4

5. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7462

- ------------------------------------------------------------------------

6. Change log

2016-11-15 VMSA-2016-0020
Initial security advisory in conjunction with the release of
vRealize Operations 6.4 on 2016-11-15.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

Twitter
https://twitter.com/VMwareSRC

Copyright 2016 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFYK673DEcm8Vbi9kMRApq6AJsFxFWG9Z3SKy/NXsNyf2JyJk7tjgCffclb
GvdwHQYiTzhkm0cUV5VUnHc=
=SVBe
-----END PGP SIGNATURE-----?



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close