what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26909

Secunia Security Advisory 26909
Posted Sep 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, perform certain actions with escalated privileges, or to cause a DoS (Denial of Service), by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
SHA-256 | c5d223fcffa5b9d2b6c30ee05e5bc289ddaa4a2a443eeb826a5a861054570483

Secunia Security Advisory 26909

Change Mirror Download


----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/

----------------------------------------------------------------------

TITLE:
VMware ESX Server Multiple Security Updates

SECUNIA ADVISORY ID:
SA26909

VERIFY ADVISORY:
http://secunia.com/advisories/26909/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Privilege escalation, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
VMware ESX Server 3.x
http://secunia.com/product/10757/
VMware ESX Server 2.x
http://secunia.com/product/2125/

DESCRIPTION:
VMware has issued an update for VMware ESX Server. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, perform certain actions with
escalated privileges, or to cause a DoS (Denial of Service), by
malicious users to bypass certain security restrictions, and by
malicious people to cause a DoS (Denial of Service) or compromise a
vulnerable system.

For more information:
SA12498
SA20370
SA21100
SA21713
SA21721
SA23904
SA24905
SA25232
SA25800

SOLUTION:
Apply patches.

-- VMware ESX 3.0.2 --

Patch Bundle ESX-1001725:
http://www.vmware.com/support/vi3/doc/esx-1001725-patch.html
md5sum 75aa49eecec2e84eb41a4c26683d4c7a

Patch Bundle ESX-1001726:
http://www.vmware.com/support/vi3/doc/esx-1001726-patch.html
md5sum ac55c65ddc2142a292648765e9dcb583

Patch Bundle ESX-1001727:
http://www.vmware.com/support/vi3/doc/esx-1001727-patch.html
md5sum bd137cbf65b20dae3aaf422a559f92a1

Patch Bundle ESX-1001728:
http://www.vmware.com/support/vi3/doc/esx-1001728-patch.html
md5sum a33f0cc5b1cfc68683c4d8643c52775c

Patch Bundle ESX-1001729:
http://www.vmware.com/support/vi3/doc/esx-1001729-patch.html
md5sum 1b2d32dc805971703bb2c8c047c6144a

Patch Bundle ESX-1001730:
http://www.vmware.com/support/vi3/doc/esx-1001730-patch.html
md5sum 7f91450c665065c9998a635bbe4c42db

Patch Bundle ESX-1001731:
http://www.vmware.com/support/vi3/doc/esx-1001731-patch.html
md5sum c349b83065f5b06cee34bae90a5a01b3


-- VMware ESX 3.0.1 --

Patch Bundle ESX-1001213:
http://www.vmware.com/support/vi3/doc/esx-1001213-patch.html
md5sum 4e942e5b47f90654696910fb8b10b144

Patch Bundle ESX-1001214:
http://www.vmware.com/support/vi3/doc/esx-1001214-patch.html
md5sum 1e63db1cc7605830b16306a35bccd878

Patch Bundle ESX-1001691:
http://www.vmware.com/support/vi3/doc/esx-1001691-patch.html
md5sum e288a71c4953aa6724ce53879c663f81

Patch Bundle ESX-1001692:
http://www.vmware.com/support/vi3/doc/esx-1001692-patch.html
md5sum 27edbac467107cc1fe6c78a839ce2144

Patch Bundle ESX-1001693:
http://www.vmware.com/support/vi3/doc/esx-1001693-patch.html
md5sum a11191b59761b6afb68ea73e9e6456d0

Patch Bundle ESX-1001694:
http://www.vmware.com/support/vi3/doc/esx-1001694-patch.html
md5sum 6ce5d882d6fe9e714ce48f719cefb182

Patch Bundle ESX-1001723:
http://www.vmware.com/support/vi3/doc/esx-1001723-patch.html
md5sum 9a31d1718d6c063cf978305b84637c40

Patch Bundle ESX-8253547:
http://www.vmware.com/support/vi3/doc/esx-8253547-patch.html
md5sum 90702b54fb6197a6680f141ad8c435fa

Patch Bundle ESX-8567382:
http://www.vmware.com/support/vi3/doc/esx-8567382-patch.html
md5sum 230a7c7ceec8bd581110ef9303a480fc


-- VMware ESX 3.0.0 --

Patch Bundle ESX-1001204:
http://www.vmware.com/support/vi3/doc/esx-1001204-patch.html
md5sum 08bfdec038ea900c72f04e8d50b2db62

Patch Bundle ESX-1001205:
http://www.vmware.com/support/vi3/doc/esx-1001205-patch.html
md5sum e6b818cf885d5fd5f93d33b27051df83

Patch Bundle ESX-1001206:
http://www.vmware.com/support/vi3/doc/esx-1001206-patch.html
md5sum bd552eb70624164067039525941ce82a

Patch Bundle ESX-1001207:
http://www.vmware.com/support/vi3/doc/esx-1001207-patch.html
md5sum acad9bce49ac9398ab1ee502980b49cb

Patch Bundle ESX-1001208:
http://www.vmware.com/support/vi3/doc/esx-1001208-patch.html
md5sum f3e26b66682191e024a9b094a063837f

Patch Bundle ESX-1001209:
http://www.vmware.com/support/vi3/doc/esx-1001209-patch.html
md5sum 1c7adad00a20f9e7ba1fbe1663ad4d66

Patch Bundle ESX-1001210:
http://www.vmware.com/support/vi3/doc/esx-1001210-patch.html
md5sum c1fb76ac529966bf65cc98cc5e5e88bb

Patch Bundle ESX-1001211:
http://www.vmware.com/support/vi3/doc/esx-1001211-patch.html
md5sum 3f30f6a1a28e6ff4c10d5e44864d327e

Patch Bundle ESX-1001212:
http://www.vmware.com/support/vi3/doc/esx-1001212-patch.html
md5sum 2bc08369d3410fa59d353e45830ae9f5

NOTE: The vendor recommends users to update to version 3.0.1 as 3.0.0
is nearing its End-of-life.


-- VMware ESX 2.5.4 --
Apply patch 10 (Build# 53326)


-- VMware ESX 2.5.3 --
Apply patch 13 (Build# 52488)


-- VMware ESX 2.1.3 --
Apply patch 8 (Build# 53228)


-- VMware ESX 2.0.2 --
Apply patch 8 (Build# 52650)

ORIGINAL ADVISORY:
VMWare (via Full-Disclosure):
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html

OTHER REFERENCES:
SA12498:
http://secunia.com/advisories/12498/

SA20370:
http://secunia.com/advisories/20370/

SA21100:
http://secunia.com/advisories/21100/

SA21713:
http://secunia.com/advisories/21713/

SA21721:
http://secunia.com/advisories/21721/

SA23904:
http://secunia.com/advisories/23904/

SA24905:
http://secunia.com/advisories/24905/

SA25232:
http://secunia.com/advisories/25232/

SA25800:
http://secunia.com/advisories/25800/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close