The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of VMware vCenter Server

computer vulnerability bulletin CVE-2017-5753 CVE-2018-3693

Processors: memory reading via Spectre Bounds Check

Synthesis of the vulnerability

A local attacker can access to the kernel memory, in order to read sensitive information.
Impacted products: SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, Solaris, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 05/01/2018.
Revision date: 21/02/2018.
Identifiers: 2016636, 519675, ADV180002, bulletinjan2018, bulletinjul2018, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-027, CERTFR-2018-AVI-029, CERTFR-2018-AVI-032, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-077, CERTFR-2018-AVI-079, CERTFR-2018-AVI-094, CERTFR-2018-AVI-114, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2018-AVI-365, CERTFR-2018-AVI-584, CERTFR-2019-AVI-042, CERTFR-2019-AVI-052, CERTFR-2019-AVI-131, CERTFR-2019-AVI-242, cisco-sa-20180104-cpusidechannel, cpuapr2018, cpuapr2019, CTX231390, CTX231399, CVE-2017-5753, CVE-2018-3693, DLA-1422-1, DLA-1422-2, DLA-1423-1, DLA-1424-1, DLA-1434-1, DLA-1731-1, DLA-1731-2, DSA-2018-049, DSA-4187-1, DSA-4188-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, HT208397, HT208401, ibm10742755, INTEL-OSS-10002, JSA10842, JSA10873, JSA10917, K91229003, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:2119-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0464-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA-505225, STORM-2018-001, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:2150-1, SUSE-SU-2018:2528-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:1550-1, Synology-SA-18:01, USN-3516-1, USN-3521-1, USN-3530-1, USN-3541-1, USN-3541-2, USN-3542-1, USN-3542-2, USN-3549-1, USN-3580-1, USN-3597-1, USN-3597-2, VIGILANCE-VUL-24948, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VMSA-2018-0007, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-5754

Intel Processors: memory reading via Meltdown

Synthesis of the vulnerability

When the system uses an Intel processor, a local attacker can access to the kernel memory, in order to read sensitive information.
Impacted products: SNS, iOS by Apple, iPhone, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, OpenBSD, openSUSE Leap, Oracle Communications, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Slackware, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, vCenter Server, Xen.
Severity: 2/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 03/01/2018.
Revision date: 05/01/2018.
Identifiers: 2016636, 519675, ADV180002, CERTFR-2018-ALE-001, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-014, CERTFR-2018-AVI-017, CERTFR-2018-AVI-018, CERTFR-2018-AVI-029, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-077, CERTFR-2018-AVI-079, CERTFR-2018-AVI-114, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-208, CERTFR-2018-AVI-225, CERTFR-2019-AVI-242, cisco-sa-20180104-cpusidechannel, cpuapr2019, CTX231390, CTX231399, CTX234679, CVE-2017-5754, DLA-1232-1, DLA-1349-1, DSA-2018-049, DSA-4078-1, DSA-4082-1, DSA-4120-1, DSA-4120-2, DSA-4179-1, FG-IR-18-002, FreeBSD-SA-18:03.speculative_execution, HT208331, HT208334, HT208394, HT208465, JSA10842, JSA10873, K91229003, MBGSA-1801, Meltdown, N1022433, nas8N1022433, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:1623-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0464-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, spectre_meltdown_advisory, SSA-168644, SSA:2018-016-01, SSA:2018-037-01, STORM-2018-001, SUSE-SU-2018:0010-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:2528-1, Synology-SA-18:01, USN-3516-1, USN-3522-1, USN-3522-2, USN-3522-3, USN-3522-4, USN-3523-1, USN-3523-2, USN-3523-3, USN-3524-1, USN-3524-2, USN-3525-1, USN-3540-1, USN-3540-2, USN-3541-1, USN-3541-2, USN-3583-1, USN-3583-2, USN-3597-1, USN-3597-2, VIGILANCE-VUL-24933, VMSA-2018-0007, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

When the system uses an Intel processor, a local attacker can access to the kernel memory, in order to read sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-4933 CVE-2017-4940 CVE-2017-4941

VMware ESXi, vCenter Server Appliance, Workstation: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of VMware ESXi, vCenter Server Appliance and Workstation.
Impacted products: ESXi, vCenter Server, VMware vSphere Hypervisor, VMware Workstation.
Severity: 2/4.
Consequences: user access/rights, client access/rights, denial of service on server, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 20/12/2017.
Identifiers: CERTFR-2017-AVI-480, CVE-2017-4933, CVE-2017-4940, CVE-2017-4941, CVE-2017-4943, TALOS-2017-0368, TALOS-2017-0369, VIGILANCE-VUL-24847, VMSA-2017-0021.

Description of the vulnerability

An attacker can use several vulnerabilities of VMware ESXi, vCenter Server Appliance and Workstation.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-4927 CVE-2017-4928

VMware vCenter Server: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of VMware vCenter Server.
Impacted products: vCenter Server.
Severity: 2/4.
Consequences: user access/rights, client access/rights, denial of service on server, denial of service on service.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/11/2017.
Identifiers: CERTFR-2017-AVI-404, CVE-2017-4927, CVE-2017-4928, FG-VD-17-009, VIGILANCE-VUL-24410, VMSA-2017-0017.

Description of the vulnerability

An attacker can use several vulnerabilities of VMware vCenter Server.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-4926

VMware vCenter Server: Cross Site Scripting via H5 Client

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via H5 Client of VMware vCenter Server, in order to run JavaScript code in the context of the web site.
Impacted products: vCenter Server.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 15/09/2017.
Identifiers: CERTFR-2017-AVI-304, CVE-2017-4926, VIGILANCE-VUL-23846, VMSA-2017-0015.

Description of the vulnerability

The VMware vCenter Server product offers a web service.

However, it does not filter received data via H5 Client before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via H5 Client of VMware vCenter Server, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2017-4921 CVE-2017-4922 CVE-2017-4923

VMware vCenter Server: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of VMware vCenter Server.
Impacted products: vCenter Server.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 3.
Creation date: 28/07/2017.
Identifiers: CERTFR-2017-AVI-239, CVE-2017-4921, CVE-2017-4922, CVE-2017-4923, VIGILANCE-VUL-23385, VMSA-2017-0013.

Description of the vulnerability

Several vulnerabilities were announced in VMware vCenter Server.

An attacker can use a vulnerability via LD_LIBRARY_PATH, in order to run code. [severity:2/4; CVE-2017-4921]

An attacker can bypass security features via Service Startup Script, in order to obtain sensitive information. [severity:2/4; CVE-2017-4922]

An attacker can bypass security features via vCenter Server Appliance Backup, in order to obtain sensitive information. [severity:2/4; CVE-2017-4923]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2017-4919

VMware vCenter Server: privilege escalation via VIX API VM Direct Access

Synthesis of the vulnerability

An attacker can bypass restrictions via VIX API VM Direct Access of VMware vCenter Server, in order to escalate his privileges.
Impacted products: vCenter Server.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: privileged account.
Creation date: 28/07/2017.
Identifiers: CERTFR-2017-AVI-239, CVE-2017-4919, VIGILANCE-VUL-23384, VMSA-2017-0012.

Description of the vulnerability

An attacker can bypass restrictions via VIX API VM Direct Access of VMware vCenter Server, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2017-5641

VMware vCenter: code execution via AMF3 messages

Synthesis of the vulnerability

An attacker can send a Java object in an AMF3 message to VMware vCenter, in order to run code.
Impacted products: vCenter Server.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 14/04/2017.
Identifiers: CERTFR-2017-AVI-115, CVE-2017-5641, VIGILANCE-VUL-22459, VMSA-2017-0007.

Description of the vulnerability

The VMware vCenter product includes BlazeDS.

This ocmponent process AFM3 messages. However, an attacker can submit an AFM3 message including a serialized Java object in such a way the the code of associated classes is run.

An attacker can therefore send a Java object in an AMF3 message to VMware vCenter, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-5638

Apache Struts: code execution via Jakarta Multipart CT

Synthesis of the vulnerability

An attacker can use a malicious Content-Type header on Apache Struts with Jakarta Multipart installed, in order to run code.
Impacted products: Struts, Cisco CUCM, Cisco Unified CCX, Avamar, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle OIT, Tuxedo, WebLogic, Percona Server, vCenter Server, VMware vSphere.
Severity: 4/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 08/03/2017.
Revision date: 14/03/2017.
Identifiers: 498123, CERTFR-2017-ALE-004, CERTFR-2017-AVI-071, cisco-sa-20170310-struts2, cpuapr2017, cpujul2017, CVE-2017-5638, ESA-2017-042, S2-045, S2-046, VIGILANCE-VUL-22047, VMSA-2017-0004, VMSA-2017-0004.6, VU#834067.

Description of the vulnerability

The Apache Struts product can be configured to use the Multipart parser of Jakarta.

The HTTP Content-Type header can contain the multipart/form-data MIME type to indicate form data. In this case, the Multipart parser of Jakarta is called.

When the Multipart parser of Jakarta is used, and when the Content-Type header contains a malformed multipart/form-data header, an exception occurs, and the header content is interpreted during the display.

An attacker can therefore use a malicious Content-Type header on Apache Struts with Jakarta Multipart installed, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-7458 CVE-2016-7459 CVE-2016-7460

VMware vCenter Server, VMware vSphere Client: three vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities were announced in VMware vCenter Server and VMware vSphere Client.
Impacted products: vCenter Server, VMware vSphere.
Severity: 2/4.
Consequences: data reading, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 23/11/2016.
Identifiers: CERTFR-2016-AVI-388, CVE-2016-7458, CVE-2016-7459, CVE-2016-7460, VIGILANCE-VUL-21194, VMSA-2016-0022.

Description of the vulnerability

Several vulnerabilities were announced in VMware vCenter Server and VMware vSphere Client.

An attacker can transmit malicious XML data via VMware vSphere Client, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2016-7458]

An attacker can transmit malicious XML data via VMware vCenter Server, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2016-7459]

An attacker can transmit malicious XML data via VMware vCenter Server, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2016-7460]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about VMware vCenter Server: