VMSA-2012-0017
VMware View Server directory traversal
VMware Security Advisory
1. Summary
VMware View releases address a critical directory traversal vulnerability in the View Connection Server and View Security Server.
2. Relevant releases
VMware View 5.x prior to version 5.1.2
VMware View 4.x prior to version 4.6.2
3. Problem Description
a. VMware View Server directory traversal
VMware View contains a critical directory traversal vulnerability that allows an unauthenticated remote attacker to retrieve arbitrary files from affected View Servers. Exploitation of this issue may expose sensitive information stored on the server.
Workarounds
This vulnerability affects both the View Connection Server and the View Security Server; VMware recommends that customers immediately update both servers to a fixed version of View.
Customers who are unable to immediately update their View Servers should consider the following options:
- Disable Security Server
Disabling the Security Server will prevent exploitation of this vulnerability over untrusted remote networks. To restore functionality for remote users, allow them to connect to the Connection Server via a VPN. - Block directory traversal attempts
It may be possible to prevent exploitation of this issue by blocking directory traversal attacks with an intrusion protection system or application layer firewall.
VMware would like to thank the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-5978 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product
Product Version
Running on
Replace with/ Apply Patch
4. Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
View 5.1.2
---------------------------
https://my.vmware.com/web/vmware/info/slug/desktop_end_user_computing/vmware_view/5_1
Release Notes
https://www.vmware.com/support/view51/doc/view-512-release-notes.html
VMware View Connection Server (32-bit)
VMware-viewconnectionserver-5.1.2-912971.exe
md5sum: 966d158be1d14268f9ef5623e0572691
sha1sum: 39e3a9205516488743df361e086faa59387e039e
VMware View Connection Server (64-bit)
VMware-viewconnectionserver-x86_64-5.1.2-912971.exe
md5sum: c4f791d3d141032cd88b9075e9680b90
sha1sum: 8866e3abae8059264672b1a8ff23a8372f620b1d
View 4.6.2
---------------------------
http://downloads.vmware.com/d/info/desktop_downloads/vmware_view/4_6
Release Notes
https://www.vmware.com/support/view46/doc/view-462-release-notes.html
VMware View Connection Server (32-bit)
VMware-viewconnectionserver-4.6.2-916912.exe
md5sum: 77ec27c0514afa179a62ecee410231a4
sha1sum: 7f5219d833366429777f5bd79323d03ccbea5b71
VMware View Connection Server (64-bit)
VMware-viewconnectionserver-x86_64-4.6.2-916912.exe
md5sum: d18de68abdb4fc52e3be65c5eca4e78b
sha1sum: 61add81d978e8a3e68fbe64e3fdc9a6b00c140b7
6. Change log
2012-12-13 VMSA-2012-0017
Initial security advisory in conjunction with the release of View 5.1.2 on 2012-12-13.
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2012 VMware Inc. All rights reserved.