Tag Archive | VMware

VMware Security Update for DoS problem among vulnerabilities, kernel source code leaks

VMware, virtualization software manager, has issued a security update for its vSphere API. This resolves a denial-of-service problem in ESX and ESXi. The ESX is a bare metal hypervisor, capable of enterprise level environments, where it doesn’t need a 3rd party operating system to run. Also, quite a few security updates were issued as part of this update.

The patch affects the following releases: VMware ESXi 4.1 without patch ESXi410-201211401-SG and VMware ESX 4.1 without patches ESX410-201211401-SG, ESX410-201211402-SG, ESX410-201211405-SG, and ESX410-201211407-SG.

Read more about the advisory, plus details on how to update.

This security update comes after, just over a week ago, Anonymous hacker “Stun” leaked the source code of ESX. The leak was first found out with a Twitter update, followed by the torrent posted on 1337x.org.

“Which VMware has succeed to ignore and continue producing on same level like it’s buddy Symantec did. Bullshitting people and selling crap. But it’s time for Anonymous finally to deliver,” said “Stun”.

Iain Mulholland, director of platform security for VMware, commented on the story:

It is possible that more related files will be posted in the future. We take customer security seriously and have engaged our VMware Security Response Center to thoroughly investigate.

Ensuring customer security is our top priority. As a matter of best practices with respect to security, VMware strongly encourages all customers to apply the latest product updates and security patches made available for their specific environment.

This also apparently is linked back to an April 2012 incident, where information was leaked also.

The kernel is apparently dated back to between 1998-2004, the years of which the kernel for VMware products was developed.

Users are encouraged to update their products with the latest product updates and security patches.

VMware Virtualization Flaws Patched – June 18

Last week, US-CERT found flaw in VMware: SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware

To patch the vulnerabilities, VMware released the updates for several versions:

  • VMware Workstation 8.0.4 and later
  • Player 4.0.4 and later
  • Fusion 4.x (but not the Mac version)
  • All versions of ESXi and ESX

The main flaws were:

  • Input data not validated correctly with Checkpoint files. Which means a specifically crafted Checkpoint file can exploit the virtualization environment.
  • Traffic from remote virtual devices not being intercepted correctly. An attacker can manipulate the traffic, and crash the VM.

It is recommended to immediately patch your environment:  updates

Ring3 Attackers: 64-bit Privilege Escalation Vulnerability on Intel CPU Hardware

Overview

Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.

Description

A ring3 attacker may be able to specifically craft a stack frame to be executed by ring0 (kernel) after a general protection exception (#GP). The fault will be handled before the stack switch, which means the exception handler will be run at ring0 with an attacker’s chosen RSP causing a privilege escalation.

Find out more about this story at US-CERT: www.kb.cert.org/vuls/id/649219

 

You may want to consider purchasing Malwarebytes’ Anti-Malware to protect against these types of threats.

%d bloggers like this: