VMware Releases Security Updates to Address a Vulnerability in vCenter Server

EST

VMware has released security updates to address a vulnerability in vCenter Server. Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review VMware Security Advisory VMSA-2017-0007 (link is external) and apply the necessary update.

VMSA-2017-0007

VMware vCenter Server updates resolve a remote code    execution vulnerability via BlazeDS

VMware Security Advisory
Advisory ID:
VMSA-2017-0007
Severity:
Critical
Synopsis:
VMware vCenter Server updates resolve a remote code execution vulnerability via BlazeDS
Issue date:
2017-04-13
Updated on:
2017-04-13 (Initial Advisory)
CVE numbers:
CVE-2017-5641
1. Summary

VMware vCenter Server updates resolve a remote code execution vulnerability via BlazeDS

2. Relevant Products
  • VMware vCenter Server
3. Problem Description

Remote code execution vulnerability via BlazeDS
VMware vCenter Server contains a remote code execution vulnerability due to the use of BlazeDS to process AMF3 messages. This issue may be exploited to execute arbitrary code when deserializing an untrusted Java object.

 

Note
The issue is present in the the Customer Experience Improvement   Program (CEIP) functionality. If a customer has opted out of CEIP the vulnerability is still present. Also opting out will not remove the vulnerability.
The table below lists the versions of vCenter Server that have a fix for the issue. It also lists the VMware Knowledge Base articles that document a workaround that removes the vulnerability.

 

VMware would like to thank Markus Wulftange of Code White GmbH for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-5641 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
vCenter Server
6.5
Any
Critical
6.5c
KB2149815
vCenter Server
6.0
Any
Critical
6.0U3b
KB2149816
vCenter Server
5.5
Any
N/A
Not affected
N/A

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Server 6.5c

Downloads:

https://my.vmware.com/web/vmware/details?downloadGroup=VC650C&productId=618&rPId=15826

Documentation:

https://www.vmware.com/support/pubs/vsphere-esxi-vcenter-server-6-pubs.html

 

 

VMware vCenter Server 6.0U3b

Downloads:

https://my.vmware.com/web/vmware/details?downloadGroup=VC60U3B&productId=491&rPId=15722

Documentation:

https://www.vmware.com/support/pubs/vsphere-esxi-vcenter-server-6-pubs.html

6. Change log

 

2017-04-13 VMSA-2017-0007

Initial security advisory in conjunction with the release of VMware vCenter Server 6.5c and 6.0U3b on 2017-04-13.

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com

bugtraq@securityfocus.com

fulldisclosure@seclists.org

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

VMware Security & Compliance Blog

https://blogs.vmware.com/security

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2017 VMware Inc. All rights reserved.

 

 

The full release about VMware Releases Security Updates to Address a Vulnerability in vCenter Server is available at the following link: https://www.us-cert.gov/ncas/current-activity/2017/04/14/VMware-Releases-Security-Updates

NetGain Technologies shares security alerts from trustworthy sources as a courtesy to clients and partners. NetGain Technologies cannot independently verify the authenticity of any threat and does not control the content on linked pages. To learn more about corporate security or to consult with a security expert at NetGain Technologies, click here, email SMART@NetGainIT.com, or call (844) 793-0385.