The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of VMware vCenter Server, vSphere Client, ESX: memory corruption of client authentication

Synthesis of the vulnerability

An attacker can setup a malicious sever, and invite VMware vCenter Server, vSphere Client and ESX clients to connect, in order to corrupt their memory, which leads to code execution.
Severity of this bulletin: 2/4.
Creation date: 01/02/2013.
Références of this threat: BID-57666, CERTA-2013-AVI-088, CVE-2013-1405, ESX350-201302401-SG, ESX400-201302001, ESX400-201302401-SG, ESX410-201301001, ESX410-201301401-SG, ESX410-201301402-SG, ESX410-201301403-SG, ESX410-201301405-SG, ESXe350-201302401-I-SG, ESXe350-201302401-O-SG, ESXe350-201302403-C-SG, ESXi400-201302001, ESXi400-201302401-SG, ESXi400-201302402-SG, ESXi400-201302403-SG, ESXi410-201301001, ESXi410-201301401-SG, ESXi410-201301402-SG, VIGILANCE-VUL-12363, VMSA-2013-0001, VMSA-2013-0001.1, VMSA-2013-0001.2, VMSA-2013-0003.

Description of the vulnerability

The VMware vCenter Server, vSphere Client and ESX products can authenticate on a VMware server.

However, if the server returns malicious data, it corrupts the client's memory.

An attacker can therefore setup a malicious sever, and invite VMware vCenter Server, vSphere Client and ESX clients to connect, in order to corrupt their memory, which leads to code execution.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security vulnerability impacts software or systems such as ESX, ESXi, vCenter Server, VirtualCenter, VMware vSphere, VMware vSphere Hypervisor.

Our Vigil@nce team determined that the severity of this computer weakness bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of intranet server.

An attacker with a expert ability can exploit this security note.

Solutions for this threat

VMware ESX 3.5: patch ESX350-201302401-SG.
A patch is available:
  http://kb.vmware.com/kb/2042541

VMware ESX 4.0: patch ESX400-201302001.
A patch is available:
  http://kb.vmware.com/kb/2041343

VMware ESX 4.1: patch ESX410-201301001.
A patch is available:
  http://kb.vmware.com/kb/2041331

VMware ESXi 3.5: patch ESXe350-201302401-O-SG.
A patch is available:
  http://kb.vmware.com/kb/2042543

VMware ESXi 4.0: patch ESXi400-201302001.
A patch is available:
  http://kb.vmware.com/kb/2041344

VMware ESXi 4.1: patch ESXi410-201301001.
A patch is available:
  http://kb.vmware.com/kb/2041332

VMware vCenter Server: version 4.0 Update 4b.
The version 4.0 Update 4b is fixed:
  https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_vsphere/4_0

VMware vCenter Server: version 4.1 Update 3a.
The version 4.1 Update 3a is fixed:
  https://downloads.vmware.com/d/info/datacenter_cloud_infrastructure/vmware_vsphere/4_1

VMware VirtualCenter: version 2.5 Update 6c.
The version 2.5 Update 6c is fixed:
  http://downloads.vmware.com/d/info/datacenter_downloads/vmware_infrastructure_3/3_5
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides computers vulnerabilities analysis. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.