Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title - VMware View Server directory traversal
Informations
Name VMSA-2012-0017 First vendor Publication 2012-12-13
Vendor VMware Last vendor Modification 2012-12-13
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

a. VMware View Server directory traversal

VMware View contains a critical directory traversal vulnerability that allows an unauthenticated remote attacker to retrieve arbitrary files from affected View Servers. Exploitation of this issue may expose sensitive information stored on the server.

Workarounds

This vulnerability affects both the View Connection Server and the View Security Server; VMware recommends that customers immediately update both servers to a fixed version of View.

Customers who are unable to immediately update their View Servers should consider the following options:

- Disable Security Server

Disabling the Security Server will prevent exploitation of this vulnerability over untrusted remote networks. To restore functionality for remote users, allow them to connect to the Connection Server via a VPN.

- Block directory traversal attempts

It may be possible to prevent exploitation of this issue by blocking directory traversal attacks with an intrusion protection system or application layer firewall.

VMware would like to thank the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-5978 to this issue.

Original Source

Url : http://www.vmware.com/security/advisories/VMSA-2012-0017.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17049
 
Oval ID: oval:org.mitre.oval:def:17049
Title: VMware View releases address a critical directory traversal vulnerability in the View Connection Server and View Security Server
Description: Multiple directory traversal vulnerabilities in the (1) View Connection Server and (2) View Security Server in VMware View 4.x before 4.6.2 and 5.x before 5.1.2 allow remote attackers to read arbitrary files via unspecified vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2012-5978
Version: 4
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s): VMware View
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 9

Nessus® Vulnerability Scanner

Date Description
2013-01-24 Name : The remote host has a desktop solution that affected by a directory traversal...
File : vmware_view_vmsa_2012_0017.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 12:07:25
  • Multiple Updates
2012-12-20 21:19:46
  • Multiple Updates
2012-12-19 13:27:29
  • Multiple Updates
2012-12-14 05:21:10
  • First insertion