The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of VMware vSphere

computer vulnerability note CVE-2017-4902 CVE-2017-4903 CVE-2017-4904

VMware ESXi, Workstation: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of VMware ESXi, Workstation.
Impacted products: ESXi, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation.
Severity: 3/4.
Creation date: 29/03/2017.
Revision date: 31/03/2017.
Identifiers: CERTFR-2017-AVI-093, CVE-2017-4902, CVE-2017-4903, CVE-2017-4904, CVE-2017-4905, VIGILANCE-VUL-22279, VMSA-2017-0006, ZDI-17-235, ZDI-17-236, ZDI-17-237, ZDI-17-238, ZDI-17-239.

Description of the vulnerability

Several vulnerabilities were announced in VMware ESXi, Workstation.

An attacker can generate a memory corruption via the SVGA video card emulation, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2017-4902, CVE-2017-4903, ZDI-17-235, ZDI-17-236, ZDI-17-237]

An attacker can generate a memory corruption via the HCI controller, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2017-4904, ZDI-17-239]

An attacker can read a memory fragment, in order to obtain sensitive information. [severity:1/4; CVE-2017-4905, ZDI-17-238]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2016-7463

VMware ESXi: Cross Site Scripting via Host Client

Synthesis of the vulnerability

An attacker can trigger a stored Cross Site Scripting via Host Client of VMware ESXi, in order to run JavaScript code in the context of the web site.
Impacted products: ESXi, VMware vSphere, VMware vSphere Hypervisor.
Severity: 2/4.
Creation date: 21/12/2016.
Identifiers: CERTFR-2016-AVI-425, CVE-2016-7463, VIGILANCE-VUL-21430, VMSA-2016-0023.

Description of the vulnerability

The VMware ESXi product offers a web service.

However, it does not filter received data via Host Client before storing then inserting them in generated HTML documents.

An attacker can therefore trigger a stored Cross Site Scripting via Host Client of VMware ESXi, in order to run JavaScript code in the context of the web site.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2016-7458 CVE-2016-7459 CVE-2016-7460

VMware vCenter Server, VMware vSphere Client: three vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities were announced in VMware vCenter Server and VMware vSphere Client.
Impacted products: vCenter Server, VMware vSphere.
Severity: 2/4.
Creation date: 23/11/2016.
Identifiers: CERTFR-2016-AVI-388, CVE-2016-7458, CVE-2016-7459, CVE-2016-7460, VIGILANCE-VUL-21194, VMSA-2016-0022.

Description of the vulnerability

Several vulnerabilities were announced in VMware vCenter Server and VMware vSphere Client.

An attacker can transmit malicious XML data via VMware vSphere Client, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2016-7458]

An attacker can transmit malicious XML data via VMware vCenter Server, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2016-7459]

An attacker can transmit malicious XML data via VMware vCenter Server, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2016-7460]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2016-5330 CVE-2016-5331

VMware: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of VMware.
Impacted products: ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation.
Severity: 2/4.
Creation date: 05/08/2016.
Revisions dates: 09/08/2016, 20/09/2016.
Identifiers: CERTFR-2016-AVI-265, CVE-2016-5330, CVE-2016-5331, SFY20151201, SYSS-2016-063, VIGILANCE-VUL-20326, VMSA-2016-0010.

Description of the vulnerability

Several vulnerabilities were announced in VMware.

An attacker can use a malicious vmhgfs.dll DLL via the VMware Tools "Shared Folders" feature (component VMware Host Guest Client Redirector), in order to run code. [severity:2/4; CVE-2016-5330, SFY20151201]

An attacker can inject an HTTP header, in order to trigger a Cross Site Scripting or a redirection. [severity:2/4; CVE-2016-5331, SYSS-2016-063]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2016-7079 CVE-2016-7080

VMware ESXi: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of VMware ESXi.
Impacted products: ESXi, VMware vSphere, VMware vSphere Hypervisor.
Severity: 1/4.
Creation date: 14/09/2016.
Identifiers: CERTFR-2016-AVI-313, CVE-2016-7079, CVE-2016-7080, VIGILANCE-VUL-20604, VMSA-2016-0014, VMSA-2016-0014.1.

Description of the vulnerability

Several vulnerabilities were announced in VMware ESXi.

An attacker can force a NULL pointer to be dereferenced via VMware Tools, in order to trigger a denial of service. [severity:1/4; CVE-2016-7079]

An attacker can force a NULL pointer to be dereferenced via VMware Tools, in order to trigger a denial of service. [severity:1/4; CVE-2016-7080]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2015-6931

VMware vCenter Server: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of VMware vCenter Server, in order to run JavaScript code in the context of the web site.
Impacted products: vCenter Server, VMware vSphere.
Severity: 2/4.
Creation date: 15/06/2016.
Identifiers: CERTFR-2016-AVI-202, CVE-2015-6931, VIGILANCE-VUL-19904, VMSA-2016-0009.

Description of the vulnerability

The VMware vCenter Server product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of VMware vCenter Server, in order to run JavaScript code in the context of the web site.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2016-2078

VMware vCenter Server: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of VMware vCenter Server, in order to run JavaScript code in the context of the web site.
Impacted products: vCenter Server, VMware vSphere.
Severity: 2/4.
Creation date: 25/05/2016.
Identifiers: CERTFR-2016-AVI-179, CVE-2016-2078, VIGILANCE-VUL-19695, VMSA-2016-0006.

Description of the vulnerability

The VMware vCenter Server product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of VMware vCenter Server, in order to run JavaScript code in the context of the web site.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2016-3427

VMware vCenter: code execution via JMX Deserialization

Synthesis of the vulnerability

An attacker can send authentication data containing a malicious object, which is unserialized by JMX on VMware vCenter, in order to run code.
Impacted products: vCenter Server, VMware vSphere.
Severity: 3/4.
Creation date: 17/05/2016.
Identifiers: CERTFR-2016-AVI-175, CVE-2016-3427, VIGILANCE-VUL-19619, VMSA-2016-0005, VMSA-2016-0005.1, VMSA-2016-0005.2, VMSA-2016-0005.3, VMSA-2016-0005.4.

Description of the vulnerability

The VMware vCenter product uses Oracle JRE JMX to process authentication credentials.

However, other classes are also unserialized by JMX.

An attacker can therefore send authentication data containing a malicious object, which is unserialized by JMX on VMware vCenter, in order to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2016-2076

VMware vCenter Server: Man-in-the-Middle of Client Integration Plugin

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle of Client Integration Plugin on VMware vCenter Server, in order to read or write data in the session.
Impacted products: vCenter Server, VMware vSphere, VMware vSphere Hypervisor.
Severity: 2/4.
Creation date: 15/04/2016.
Identifiers: CERTFR-2016-AVI-130, CVE-2016-2076, VIGILANCE-VUL-19388, VMSA-2016-0004.

Description of the vulnerability

The VMware vCenter Server product uses the TLS protocol, in order to create secure sessions with the Client Integration Plugin.

However, the X.509 certificate and the service identity are not correctly checked.

An attacker can therefore act as a Man-in-the-Middle of Client Integration Plugin on VMware vCenter Server, in order to read or write data in the session.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2015-7547

glibc: buffer overflow of getaddrinfo

Synthesis of the vulnerability

An attacker, who owns a malicious DNS server, can reply with long data to a client application using the getaddrinfo() function of the glibc, in order to trigger a denial of service, and possibly to run code in the client application.
Impacted products: ArubaOS, Blue Coat CAS, Brocade Network Advisor, Brocade vTM, Cisco ASR, Cisco Catalyst, IOS XE Cisco, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Cisco Prime DCNM, Secure ACS, Cisco CUCM, Cisco IP Phone, Cisco Wireless IP Phone, Cisco Wireless Controller, XenDesktop, PowerPath, Unisphere EMC, VNX Operating Environment, VNX Series, ExtremeXOS, BIG-IP Hardware, TMOS, Fedora, QRadar SIEM, Trinzic, NSM Central Manager, NSMXpress, McAfee Email Gateway, McAfee MOVE AntiVirus, VirusScan, McAfee Web Gateway, openSUSE, openSUSE Leap, Palo Alto Firewall PA***, PAN-OS, RealPresence Distributed Media Application, Polycom VBP, RHEL, ROX, RuggedSwitch, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware vSphere, VMware vSphere Hypervisor, WindRiver Linux.
Severity: 4/4.
Creation date: 16/02/2016.
Revision date: 17/02/2016.
Identifiers: 046146, 046151, 046153, 046155, 046158, 1977665, 478832, 479427, 479906, 480572, 480707, 480708, ARUBA-PSA-2016-001, BSA-2016-003, BSA-2016-004, CERTFR-2016-AVI-066, CERTFR-2016-AVI-071, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, cisco-sa-20160218-glibc, CTX206991, CVE-2015-7547, ESA-2016-020, ESA-2016-027, ESA-2016-028, ESA-2016-029, ESA-2016-030, FEDORA-2016-0480defc94, FEDORA-2016-0f9e9a34ce, JSA10774, KB #4858, openSUSE-SU-2016:0490-1, openSUSE-SU-2016:0510-1, openSUSE-SU-2016:0511-1, openSUSE-SU-2016:0512-1, PAN-SA-2016-0021, RHSA-2016:0175-01, RHSA-2016:0176-01, RHSA-2016:0225-01, SA114, SB10150, SOL47098834, SSA:2016-054-02, SSA-301706, SUSE-SU-2016:0470-1, SUSE-SU-2016:0471-1, SUSE-SU-2016:0472-1, SUSE-SU-2016:0473-1, USN-2900-1, VIGILANCE-VUL-18956, VMSA-2016-0002, VMSA-2016-0002.1, VN-2016-003.

Description of the vulnerability

The glibc library implements a DNS resolver (libresolv).

An application can thus call the getaddrinfo() function, which queries DNS servers. When the AF_UNSPEC type is used in the getaddrinfo() call, two DNS A and AAAA queries are sent simultaneously. However, this special case, and a case with AF_INET6 are not correctly managed, and lead to an overflow if the reply coming from the DNS server is larger than 2048 bytes.

An attacker, who owns a malicious DNS server, can therefore reply with large data to a client application using the getaddrinfo() function of the glibc, in order to trigger a denial of service, and possibly to run code in the client application.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about VMware vSphere: