Secunia Security Advisory - VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, perform certain actions with escalated privileges, or to cause a DoS (Denial of Service), by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
c5d223fcffa5b9d2b6c30ee05e5bc289ddaa4a2a443eeb826a5a861054570483
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
VMware ESX Server Multiple Security Updates
SECUNIA ADVISORY ID:
SA26909
VERIFY ADVISORY:
http://secunia.com/advisories/26909/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Privilege escalation, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
VMware ESX Server 3.x
http://secunia.com/product/10757/
VMware ESX Server 2.x
http://secunia.com/product/2125/
DESCRIPTION:
VMware has issued an update for VMware ESX Server. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, perform certain actions with
escalated privileges, or to cause a DoS (Denial of Service), by
malicious users to bypass certain security restrictions, and by
malicious people to cause a DoS (Denial of Service) or compromise a
vulnerable system.
For more information:
SA12498
SA20370
SA21100
SA21713
SA21721
SA23904
SA24905
SA25232
SA25800
SOLUTION:
Apply patches.
-- VMware ESX 3.0.2 --
Patch Bundle ESX-1001725:
http://www.vmware.com/support/vi3/doc/esx-1001725-patch.html
md5sum 75aa49eecec2e84eb41a4c26683d4c7a
Patch Bundle ESX-1001726:
http://www.vmware.com/support/vi3/doc/esx-1001726-patch.html
md5sum ac55c65ddc2142a292648765e9dcb583
Patch Bundle ESX-1001727:
http://www.vmware.com/support/vi3/doc/esx-1001727-patch.html
md5sum bd137cbf65b20dae3aaf422a559f92a1
Patch Bundle ESX-1001728:
http://www.vmware.com/support/vi3/doc/esx-1001728-patch.html
md5sum a33f0cc5b1cfc68683c4d8643c52775c
Patch Bundle ESX-1001729:
http://www.vmware.com/support/vi3/doc/esx-1001729-patch.html
md5sum 1b2d32dc805971703bb2c8c047c6144a
Patch Bundle ESX-1001730:
http://www.vmware.com/support/vi3/doc/esx-1001730-patch.html
md5sum 7f91450c665065c9998a635bbe4c42db
Patch Bundle ESX-1001731:
http://www.vmware.com/support/vi3/doc/esx-1001731-patch.html
md5sum c349b83065f5b06cee34bae90a5a01b3
-- VMware ESX 3.0.1 --
Patch Bundle ESX-1001213:
http://www.vmware.com/support/vi3/doc/esx-1001213-patch.html
md5sum 4e942e5b47f90654696910fb8b10b144
Patch Bundle ESX-1001214:
http://www.vmware.com/support/vi3/doc/esx-1001214-patch.html
md5sum 1e63db1cc7605830b16306a35bccd878
Patch Bundle ESX-1001691:
http://www.vmware.com/support/vi3/doc/esx-1001691-patch.html
md5sum e288a71c4953aa6724ce53879c663f81
Patch Bundle ESX-1001692:
http://www.vmware.com/support/vi3/doc/esx-1001692-patch.html
md5sum 27edbac467107cc1fe6c78a839ce2144
Patch Bundle ESX-1001693:
http://www.vmware.com/support/vi3/doc/esx-1001693-patch.html
md5sum a11191b59761b6afb68ea73e9e6456d0
Patch Bundle ESX-1001694:
http://www.vmware.com/support/vi3/doc/esx-1001694-patch.html
md5sum 6ce5d882d6fe9e714ce48f719cefb182
Patch Bundle ESX-1001723:
http://www.vmware.com/support/vi3/doc/esx-1001723-patch.html
md5sum 9a31d1718d6c063cf978305b84637c40
Patch Bundle ESX-8253547:
http://www.vmware.com/support/vi3/doc/esx-8253547-patch.html
md5sum 90702b54fb6197a6680f141ad8c435fa
Patch Bundle ESX-8567382:
http://www.vmware.com/support/vi3/doc/esx-8567382-patch.html
md5sum 230a7c7ceec8bd581110ef9303a480fc
-- VMware ESX 3.0.0 --
Patch Bundle ESX-1001204:
http://www.vmware.com/support/vi3/doc/esx-1001204-patch.html
md5sum 08bfdec038ea900c72f04e8d50b2db62
Patch Bundle ESX-1001205:
http://www.vmware.com/support/vi3/doc/esx-1001205-patch.html
md5sum e6b818cf885d5fd5f93d33b27051df83
Patch Bundle ESX-1001206:
http://www.vmware.com/support/vi3/doc/esx-1001206-patch.html
md5sum bd552eb70624164067039525941ce82a
Patch Bundle ESX-1001207:
http://www.vmware.com/support/vi3/doc/esx-1001207-patch.html
md5sum acad9bce49ac9398ab1ee502980b49cb
Patch Bundle ESX-1001208:
http://www.vmware.com/support/vi3/doc/esx-1001208-patch.html
md5sum f3e26b66682191e024a9b094a063837f
Patch Bundle ESX-1001209:
http://www.vmware.com/support/vi3/doc/esx-1001209-patch.html
md5sum 1c7adad00a20f9e7ba1fbe1663ad4d66
Patch Bundle ESX-1001210:
http://www.vmware.com/support/vi3/doc/esx-1001210-patch.html
md5sum c1fb76ac529966bf65cc98cc5e5e88bb
Patch Bundle ESX-1001211:
http://www.vmware.com/support/vi3/doc/esx-1001211-patch.html
md5sum 3f30f6a1a28e6ff4c10d5e44864d327e
Patch Bundle ESX-1001212:
http://www.vmware.com/support/vi3/doc/esx-1001212-patch.html
md5sum 2bc08369d3410fa59d353e45830ae9f5
NOTE: The vendor recommends users to update to version 3.0.1 as 3.0.0
is nearing its End-of-life.
-- VMware ESX 2.5.4 --
Apply patch 10 (Build# 53326)
-- VMware ESX 2.5.3 --
Apply patch 13 (Build# 52488)
-- VMware ESX 2.1.3 --
Apply patch 8 (Build# 53228)
-- VMware ESX 2.0.2 --
Apply patch 8 (Build# 52650)
ORIGINAL ADVISORY:
VMWare (via Full-Disclosure):
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
OTHER REFERENCES:
SA12498:
http://secunia.com/advisories/12498/
SA20370:
http://secunia.com/advisories/20370/
SA21100:
http://secunia.com/advisories/21100/
SA21713:
http://secunia.com/advisories/21713/
SA21721:
http://secunia.com/advisories/21721/
SA23904:
http://secunia.com/advisories/23904/
SA24905:
http://secunia.com/advisories/24905/
SA25232:
http://secunia.com/advisories/25232/
SA25800:
http://secunia.com/advisories/25800/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------