VMware vCenter and ESXi – UPDATE

Number: AV16-030
Date: 15 February 2016

Purpose

The purpose of this advisory is to bring attention to the recently released updates to address critical security issues for VMware vCenter Server and ESXi.

Assessment

VMware has released security updates to address multiple security vulnerabilities in vCenter and ESXi. Exploitation of one of these vulnerabilities may allow a remote attacker to execute code remotely on an ESXi host, execute arbitrary code on a vCenter server or allow an unauthenticated attacker to create a denial-of-service condition in the vpxd service.

Affected versions are:

-VMware ESXi 5.5 without patch ESXi550-201509101-SG
-VMware ESXi 5.1 without patch ESXi510-201510101-SG
-VMware ESXi 5.0 without patch ESXi500-201510101-SG

 -VMware vCenter Server 6.0 prior to version 6.0.0b
-VMware vCenter Server 5.5 prior to version 5.5 update 3
-VMware vCenter Server 5.1 prior to version 5.1 update u3b
-VMware vCenter Server 5.0 prior to version 5.0 update u3e

CVE References: CVE-2015-5177, CVE-2015-2342, CVE-2015-1047

Suggested Action

CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.

References:

VMWare: http://www.vmware.com/security/advisories/VMSA-2015-0007.html
US-CERT: https://www.us-cert.gov/ncas/current-activity/2015/10/01/VMware-Releases-Security-Advisory
CVE-2015-5177: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5177
CVE-2015-2342: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2342
CVE-2015-1047: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1047

Date modified: