vRealize Operations update addresses REST API deserialization vulnerability.
a. vRealize Operations REST API deserialization vulnerability
vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be chosen. Overwriting files is not feasible.
VMware would like to thank Jacob Baines of Tenable Network Security for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7462 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
Downloads and Documentation:
6. Change log
Initial security advisory in conjunction with the release of vRealize Operations 6.4 on 2016-11-15.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
Copyright 2016 VMware Inc. All rights reserved.