Number: AV16-030
Date: 15 February 2016
Purpose
The purpose of this advisory is to bring attention to the recently released updates to address critical security issues for VMware vCenter Server and ESXi.
Assessment
VMware has released security updates to address multiple security vulnerabilities in vCenter and ESXi. Exploitation of one of these vulnerabilities may allow a remote attacker to execute code remotely on an ESXi host, execute arbitrary code on a vCenter server or allow an unauthenticated attacker to create a denial-of-service condition in the vpxd service.
Affected versions are:
-VMware ESXi 5.5 without patch ESXi550-201509101-SG
-VMware ESXi 5.1 without patch ESXi510-201510101-SG
-VMware ESXi 5.0 without patch ESXi500-201510101-SG
-VMware vCenter Server 6.0 prior to version 6.0.0b
-VMware vCenter Server 5.5 prior to version 5.5 update 3
-VMware vCenter Server 5.1 prior to version 5.1 update u3b
-VMware vCenter Server 5.0 prior to version 5.0 update u3e
CVE References: CVE-2015-5177, CVE-2015-2342, CVE-2015-1047
Suggested Action
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
References:
VMWare: http://www.vmware.com/security/advisories/VMSA-2015-0007.html
US-CERT: https://www.us-cert.gov/ncas/current-activity/2015/10/01/VMware-Releases-Security-Advisory
CVE-2015-5177: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5177
CVE-2015-2342: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2342
CVE-2015-1047: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1047