Executive Summary
Summary | |
---|---|
Title | VMware security updates for vCenter Server |
Informations | |||
---|---|---|---|
Name | VMSA-2013-0006 | First vendor Publication | 2013-04-25 |
Vendor | VMware | Last vendor Modification | 2013-10-17 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. vCenter Server AD anonymous LDAP binding credential by-pass vCenter Server when deployed in an environment that uses Active Directory (AD) with anonymous LDAP binding enabled doesn't properly handle login credentials. In this environment, authenticating to vCenter Server with a valid user name and a blank password may be successful even if a non-blank password is required for the account. The issue is present on vCenter Server 5.1, 5.1a and 5.1b if AD anonymous LDAP binding is enabled. The issue is addressed in vCenter Server 5.1 Update 1 by removing the possibility to authenticate using blank passwords. This change in the authentication mechanism is present regardless if anonymous binding is enabled or not. Workaround The workaround is to discontinue the use of AD anonymous LDAP binding if it is enabled in your environment. AD anonymous LDAP binding is not enabled by default. The TechNet article listed in the references section explains how to check for anonymous binding (look for "anonymous binding" in the article: anonymous binding is enabled if the seventh bit of the dsHeuristics attribute is set to 2) The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-3107 to this issue. b. vCenter Server Appliance arbitrary file execution The vCenter Server Appliance (vCSA) contains a remote code vulnerability. An authenticated attacker with access to the Virtual Appliance Management Interface (VAMI) may run an existing file as root. In the default vCSA setup, authentication to vCSA is limited to root since root is the only defined user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-3079 to this issue. c. vCenter Server Appliance arbitrary file upload The vCenter Server Appliance (vCSA) VAMI web interface contains a vulnerability that allows an authenticated remote attacker to upload files to an arbitrary location creating new files or overwriting existing files. Replacing certain files may result in a denial of service condition or code execution. In the default vCSA setup, authentication to vCSA is limited to root since root is the only defined user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-3080 to this issue. d. vCenter, Update Manager, Oracle (Sun) JRE update 1.6.0_37 Oracle (Sun) JRE is updated to version 1.6.0_37, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. Oracle has documented the CVE identifiers that are addressed in JRE 1.6.0_37 in the Oracle Java SE Critical Patch Update Advisory of October 2012. The References section provides a link to this advisory. e. vCenter Server tc-server 2.8.1 / Apache Tomcat 6.0.36 update tc-server has been updated to version 2.8.1 to address multiple security issues. This version of tc-server includes Apache Tomcat 6.0.36 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2012-5885, CVE-2012-5886, CVE-2012-5887, CVE-2012-2733, CVE-2012-4534, CVE-2012-3546 and CVE-2012-4431 to these issues. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2013-0006.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
20 % | CWE-287 | Improper Authentication |
10 % | CWE-399 | Resource Management Errors |
10 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
10 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17934 | |||
Oval ID: | oval:org.mitre.oval:def:17934 | ||
Title: | USN-1637-1 -- tomcat6 vulnerabilities | ||
Description: | Several security issues were fixed in Apache Tomcat. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1637-1 CVE-2012-2733 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 7 |
Platform(s): | Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18263 | |||
Oval ID: | oval:org.mitre.oval:def:18263 | ||
Title: | USN-1685-1 -- tomcat6, tomcat7 vulnerabilities | ||
Description: | Several security issues were fixed in Tomcat. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1685-1 CVE-2012-3546 CVE-2012-4431 CVE-2012-4534 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | tomcat7 tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18605 | |||
Oval ID: | oval:org.mitre.oval:def:18605 | ||
Title: | DSA-2725-1 tomcat6 - several | ||
Description: | Two security issues have been found in the Tomcat servlet and JSP engine: | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2725-1 CVE-2012-3544 CVE-2013-2067 CVE-2012-2733 CVE-2012-3546 CVE-2012-4431 CVE-2012-4534 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 8 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19322 | |||
Oval ID: | oval:org.mitre.oval:def:19322 | ||
Title: | HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabilities | ||
Description: | The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5885 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19432 | |||
Oval ID: | oval:org.mitre.oval:def:19432 | ||
Title: | HP-UX Running Apache, Remote Denial of Service (DoS), Execution of Arbitrary Code and other vulnerabilities | ||
Description: | The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5885 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21075 | |||
Oval ID: | oval:org.mitre.oval:def:21075 | ||
Title: | RHSA-2013:0623: tomcat6 security update (Important) | ||
Description: | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0623-01 CESA-2013:0623 CVE-2012-3546 CVE-2012-4534 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 73 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24031 | |||
Oval ID: | oval:org.mitre.oval:def:24031 | ||
Title: | ELSA-2013:0623: tomcat6 security update (Important) | ||
Description: | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0623-01 CVE-2012-3546 CVE-2012-4534 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 | Version: | 25 |
Platform(s): | Oracle Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27399 | |||
Oval ID: | oval:org.mitre.oval:def:27399 | ||
Title: | DEPRECATED: ELSA-2013-0623 -- tomcat6 security update (important) | ||
Description: | [0:6.0.24-52] - Related: rhbz 882010 rhbz 883692 rhbz 883705 - Javadoc generation did not work. Using targetrhel-6.4.Z-noarch-candidate - to avoid building on ppc64, ppc, and x390x. [0:6.0.24-50] - Resolves: rhbz 882010 CVE-2012-3439 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 - three DIGEST authentication issues - Resolves: rhbz 883692 CVE-2012-4534 Denial of service when using - SSL NIO sendfile - Resolves: rhbz 883705 CVE-2012-3546 Bypass of Realm security constraints | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0623 CVE-2012-5885 CVE-2012-5887 CVE-2012-5886 CVE-2012-3546 CVE-2012-4534 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | tomcat6 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-26 | Name : Fedora Update for tomcat FEDORA-2012-20151 File : nvt/gb_fedora_2012_20151_tomcat_fc16.nasl |
2012-11-27 | Name : Apache Tomcat HTTP NIO Denial Of Service Vulnerability (Windows) File : nvt/gb_apache_tomcat_http_nio_connector_dos_vuln_win.nasl |
2012-11-27 | Name : Apache Tomcat Multiple Security Bypass Vulnerabilities (Windows) File : nvt/gb_apache_tomcat_mult_sec_bypass_vuln_win.nasl |
2012-11-26 | Name : FreeBSD Ports: tomcat File : nvt/freebsd_tomcat2.nasl |
2012-11-23 | Name : Ubuntu Update for tomcat6 USN-1637-1 File : nvt/gb_ubuntu_USN_1637_1.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-11-21 | IAVM : 2013-A-0219 - Multiple Vulnerabilities in Juniper Networks and Security Manager Severity : Category I - VMSKEY : V0042384 |
2013-05-09 | IAVM : 2013-B-0046 - Multiple Vulnerabilities in VMware vCenter Server Appliance 5.1 Severity : Category II - VMSKEY : V0037775 |
2013-05-02 | IAVM : 2013-B-0041 - Multiple Vulnerabilities in VMware vCenter Server 5.1 Severity : Category I - VMSKEY : V0037766 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_tomcat_20140401.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-29.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0641.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0197.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0196.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0195.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0158.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0005.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0266.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0268.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-883.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-884.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-23.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-24.nasl - Type : ACT_GATHER_INFO |
2014-01-31 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1437.nasl - Type : ACT_GATHER_INFO |
2013-11-21 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_2012_2_r5.nasl - Type : ACT_GATHER_INFO |
2013-07-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2725.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0869.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0623.nasl - Type : ACT_GATHER_INFO |
2013-07-03 | Name : The remote host has a virtualization appliance installed that is affected by ... File : vmware_vcenter_server_appliance_vmsa-2013-0006.nasl - Type : ACT_GATHER_INFO |
2013-05-30 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0869.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130528_tomcat6_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0869.nasl - Type : ACT_GATHER_INFO |
2013-04-30 | Name : The remote host has a virtualization management application installed that is... File : vmware_vcenter_vmsa-2013-0006.nasl - Type : ACT_GATHER_INFO |
2013-03-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0647.nasl - Type : ACT_GATHER_INFO |
2013-03-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130311_tomcat6_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0640.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130312_tomcat5_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0623.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0629.nasl - Type : ACT_GATHER_INFO |
2013-03-12 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0623.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_tomcat5-8397.nasl - Type : ACT_GATHER_INFO |
2013-02-04 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_tomcat6-130107.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0192.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0147.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0164.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0193.nasl - Type : ACT_GATHER_INFO |
2013-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1685-1.nasl - Type : ACT_GATHER_INFO |
2012-12-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_953911fe51ef11e28e340022156e8794.nasl - Type : ACT_GATHER_INFO |
2012-12-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_134acaa251ef11e28e340022156e8794.nasl - Type : ACT_GATHER_INFO |
2012-12-20 | Name : The remote Fedora host is missing a security update. File : fedora_2012-20151.nasl - Type : ACT_GATHER_INFO |
2012-12-10 | Name : The remote Apache Tomcat server is affected by a security bypass vulnerability. File : tomcat_7_0_32.nasl - Type : ACT_GATHER_INFO |
2012-12-06 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_f599dfc43ec211e28ae1001a8056d0b5.nasl - Type : ACT_GATHER_INFO |
2012-11-23 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1637-1.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_6_0_36.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple security weaknesses. File : tomcat_5_5_36.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple remote denial of serv... File : tomcat_7_0_28.nasl - Type : ACT_GATHER_INFO |
2012-11-21 | Name : The remote Apache Tomcat server is affected by multiple vulnerabilities. File : tomcat_7_0_30.nasl - Type : ACT_GATHER_INFO |
2012-11-12 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4ca265742a2c11e299c700a0d181e71d.nasl - Type : ACT_GATHER_INFO |
2012-11-12 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_152e4c7e2a2e11e299c700a0d181e71d.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:07:26 |
|
2013-11-11 12:41:42 |
|
2013-10-18 09:18:56 |
|
2013-09-09 21:21:03 |
|