VMSA-2014-0001

VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
VMSA-2014-0001
VMware Security Advisory Synopsis:
VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues
VMware Security Advisory Issue date:
2014-01-16
VMware Security Advisory Updated on:
2014-01-16 (initial advisory)
VMware Security Advisory CVE numbers:
CVE-2014-1207, CVE-2014-1208, CVE-2014-1211
1. Summary


VMware Workstation, Player, Fusion, ESXi, ESX and vCloud Director address several security issues.

 
2. Relevant releases


VMware Workstation 9.x prior to version 9.0

VMware Player 5.x prior to version 5.0

VMware Fusion 5.x prior to version 5.0

VMware ESXi 5.1 without patch ESXi510-201401101
VMware ESXi 5.0 without patch ESXi500-201310101
VMware ESXi 4.1 without patch ESXi410-201312401
VMware ESXi 4.0 without patch ESXi400-201310401

VMware ESX 4.1 without patch ESX410-201312401
VMware ESX 4.0 without patch ESX400-201310401

vCloud Director 5.1.x prior to version 5.1.3

3. Problem Description

a. VMware ESXi and ESX NFC NULL pointer dereference

VMware ESXi and ESX contain a NULL pointer dereference in the handling of the Network File Copy (NFC) traffic. To exploit this vulnerability, an attacker must intercept and modify the NFC traffic between ESXi/ESX and the client. Exploitation of the issue may lead to a Denial of Service.

To reduce the likelihood of exploitation, vSphere components should be deployed on an isolated management network.
    
VMware would like to thank Alex Chapman of Context Information Security for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1207 to this issue.

Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

 

VMware Product
Product Version
Running on
Replace with /  Apply Patch
VMware Product vCenter Server
Product Version any
Running on any
Replace with /  Apply Patch not affected
VMware Product
Product Version
Running on
Replace with /  Apply Patch
VMware Product hosted*
Product Version any
Running on any
Replace with /  Apply Patch not affected
VMware Product
Product Version
Running on
Replace with /  Apply Patch
VMware Product ESXi
Product Version 5.5
Running on ESXi
Replace with /  Apply Patch not affected
VMware Product ESXi
Product Version 5.1
Running on ESXi
Replace with /  Apply Patch ESXi510-201401101-SG
VMware Product ESXi
Product Version 5.0
Running on ESXi
Replace with /  Apply Patch ESXi500-201310101-SG
VMware Product ESXi
Product Version 4.1
Running on ESXi
Replace with /  Apply Patch ESXi410-201312401-SG
VMware Product ESXi
Product Version 4.0
Running on ESXi
Replace with /  Apply Patch ESXi400-201310401-SG
VMware Product
Product Version
Running on
Replace with /  Apply Patch
VMware Product ESX
Product Version 4.1
Running on ESX
Replace with /  Apply Patch ESX410-201312401-SG
VMware Product ESX
Product Version 4.0
Running on ESX
Replace with /  Apply Patch ESX410-201312401-SG

* hosted products are VMware Workstation, Player and Fusion.

b. VMware VMX process denial of service vulnerability

Due to a flaw in the handling of invalid ports, it is possible to cause the VMX process to fail. This vulnerability may allow a guest user to affect the VMX process resulting in a partial denial of service on the host.

VMware would like to thank Recurity Labs GmbH and the Bundesamt Sicherheit in der Informationstechnik (BSI) for reporting this issue to us

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1208 to this issue.

Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Replace with /  Apply Patch
VMware Product vCenter Server
Product Version any
Running on any
Replace with /  Apply Patch not affected
VMware Product Workstation
Product Version 10.0
Running on any
Replace with /  Apply Patch not affected
VMware Product Workstation
Product Version 9.0
Running on any
Replace with /  Apply Patch 9.0.1 or later
VMware Product Player
Product Version 6.0
Running on any
Replace with /  Apply Patch not affected
VMware Product Player
Product Version 5.0
Running on any
Replace with /  Apply Patch 5.0.1 or later
VMware Product Fusion
Product Version 6.0
Running on Mac OS/X
Replace with /  Apply Patch not affected
VMware Product Fusion
Product Version 5.0
Running on Mac OS/X
Replace with /  Apply Patch 5.0.1 or later
VMware Product ESXi
Product Version 5.5
Running on ESXi
Replace with /  Apply Patch not affected
VMware Product ESXi
Product Version 5.1
Running on ESXi
Replace with /  Apply Patch ESXi510-201401101-SG
VMware Product ESXi
Product Version 5.0
Running on ESXi
Replace with /  Apply Patch ESXi500-201310101-SG
VMware Product ESXi
Product Version 4.1
Running on ESXi
Replace with /  Apply Patch ESXi410-201312401-SG
VMware Product ESXi
Product Version 4.0
Running on ESXi
Replace with /  Apply Patch ESXi400-201310401-SG
VMware Product ESX
Product Version 4.1
Running on ESX
Replace with /  Apply Patch ESX410-201312401-SG
VMware Product ESX
Product Version 4.0
Running on ESX
Replace with /  Apply Patch ESX410-201312401-SG


c. VMware vCloud Director Cross Site Request Forgery (CSRF)

VMware vCloud Director contains a vulnerability in the Hyper Text Transfer Protocol (http) session management. An attacker may trick an authenticated user to click a malicious link, which would result in the user being logged out. The user is able to immediately log back into the system.

VMware would like to thank Mattia Folador for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2014-1211 to this issue.

Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is
available.


VMware Product
Product Version
Running on
Replace with /  Apply Patch
VMware Product vCloud Director
Product Version 5.5
Running on any
Replace with /  Apply Patch not affected
VMware Product vCloud Director
Product Version 5.1.x
Running on any
Replace with /  Apply Patch 5.1.3
4. Solution


Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

VMware Workstation 9.x
----------------------
https://www.vmware.com/go/downloadworkstation

VMware Player 5.x
------------------
https://www.vmware.com/go/downloadplayer

Fusion 5.x
------------------
https://www.vmware.com/go/downloadfusion
   
ESXi and ESX
------------------
https://www.vmware.com/patchmgr/download.portal

ESXi 5.1
------------------
File: update-from-esxi5.1-5.1_update02.zip
md5sum: 462cb98dc011804d3bad85f54f6b8133
sha1sum: 0352bf0adc78ceead74c7ace256ed87705e64703
http://kb.vmware.com/kb/2062314
update-from-esxi5.1-5.1_update02 contains ESXi510-201401101-SG

ESXi 5.0
------------------
File: update-from-esxi5.0-5.0_update03.zip
md5sum: 7e6185fa3238a4895613b39e57a2a94b
sha1sum: aa3929d2c8183aeaecdc238cbbf4d270bd70dd07
http://kb.vmware.com/kb/2055559
update-from-esxi5.0-5.0_update03 contains ESXi500-201310101-SG

ESXi 4.1
------------------
File: ESXi410-201312001.zip
md5sum: f85c0c449513b88b22f19a5f11966d5e
sha1sum: cfde5abbef77976b76d55813ae1e7bbbbca25b7b
http://kb.vmware.com/kb/2061210
ESXi410-201312001 contains ESX410-201312401-SG

ESXi 4.0
------------------
File: ESXi400-201310001.zip
md5sum: 3075bce1b19a52b053a5dc18d06d40e0
sha1sum: 19952da0dd9f81ea299cb8ae6c462f11566b56e0
http://kb.vmware.com/kb/2059496
ESXi400-201310001 contains ESXi400-201310401-SG

ESX 4.1
------------------
File: ESX410-201312001.zip
md5sum: c35763a84db169dd0285442d4129cc18
sha1sum: ee8e1b8d2d383422ff0dde04749c5d89e77d8e40
http://kb.vmware.com/kb/2061209
ESX410-201312001 contains ESX410-201312401-SG

ESX 4.0
------------------
File: ESX400-201310001.zip
md5sum: 9d47cf815ed142a17f97002379b5e386
sha1sum: 91082ec4263333f9b996883cb53dbe9aab7a88b5
http://kb.vmware.com/kb/2059495
ESX400-201310001contains ESX400-201310401-SG

vCloud Director 5.1.x
---------------------
https://www.vmware.com/go/download/vcloud-director

6. Change log

2014-01-16 VMSA-2014-0001
Initial security advisory in conjunction with the release of vSphere 5.1 Update 2 and vCloud Director 5.1.3 on 2014-01-16

7. Contact


E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  • security-announce at lists.vmware.com
  • bugtraq at securityfocus.com
  • full-disclosure at lists.grok.org.uk


E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2014 VMware Inc.  All rights reserved.