Executive Summary
Summary | |
---|---|
Title | vRealize Operations update addresses REST API deserialization vulnerability. |
Informations | |||
---|---|---|---|
Name | VMSA-2016-0020 | First vendor Publication | 2016-11-15 |
Vendor | VMware | Last vendor Modification | 2016-11-15 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:N/I:P/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 7.8 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. vRealize Operations REST API deserialization vulnerability vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be chosen. Overwriting files is not feasible. VMware would like to thank Jacob Baines of Tenable Network Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7462 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2016-0020.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-749 | Exposed Dangerous Method or Function |
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 5 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-12-01 | Name : A cloud operations management application running on the remote web server is... File : vmware_vrealize_operations_manager_v640_deserialization.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-12-29 21:25:16 |
|
2016-12-29 13:22:01 |
|
2016-12-02 13:24:59 |
|
2016-11-16 09:23:24 |
|