Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title VMware vCenter Server and vSphere Client security vulnerabilities
Informations
Name VMSA-2011-0008 First vendor Publication 2011-05-05
Vendor VMware Last vendor Modification 2011-05-05
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

a. vCenter Server Directory Traversal vulnerability

A directory traversal vulnerability allows an attacker to remotely retrieve files from vCenter Server without authentication. In order to exploit this vulnerability, the attacker will need to have access to the network on which the vCenter Server host resides.

In case vCenter Server is installed on Windows 2008 or Windows 2008 R2, the security vulnerability is not present.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-0426 to this issue.

b. vCenter Server SOAP ID disclosure

The SOAP session ID can be retrieved by any user that is logged in to vCenter Server. This might allow a local unprivileged user on vCenter Server to elevate his or her privileges.

VMware would like to thank Claudio Criscione for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-1788 to this issue.

Original Source

Url : http://www.vmware.com/security/advisories/VMSA-2011-0008.html

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-310 Cryptographic Issues
33 % CWE-200 Information Exposure
33 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 2
Application 4
Application 6

Open Source Vulnerability Database (OSVDB)

Id Description
73866 VMware Multiple Products vSphere Client Installer Digital Signature Verificat...

72179 VMware vCenter Server SOAP Session ID Local Information Disclosure

VMware vCenter Server contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when the program insecurely stores SOAP sesion IDs in a log file, which will disclose administrative user IDs to a local attacker.
72178 VMware vCenter Server / VirtualCenter Unspecified Traversal Arbitrary File Ac...

VMware vCenter Server and VirtualCenter contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../). This directory traversal attack would allow the attacker to access arbitrary files.

Information Assurance Vulnerability Management (IAVM)

Date Description
2011-05-12 IAVM : 2011-A-0066 - Multiple Vulnerabilities in VMware Products
Severity : Category I - VMSKEY : V0027158

Nessus® Vulnerability Scanner

Date Description
2016-03-04 Name : The remote VMware ESX / ESXi host is missing a security-related patch.
File : vmware_VMSA-2011-0008_remote.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2011-0008.nasl - Type : ACT_GATHER_INFO
2011-05-09 Name : The remote VMware ESXi / ESX host is missing a security-related patch.
File : vmware_VMSA-2011-0008.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2016-03-05 13:26:43
  • Multiple Updates
2014-11-27 13:28:43
  • Multiple Updates
2014-02-17 12:07:19
  • Multiple Updates
2013-11-11 12:41:39
  • Multiple Updates