Wednesday, June 15, 2016

Bugtraq: NEW VMSA-2016-0009 VMware vCenter Server updates address an important reflective cross-site scripting issue

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

- -----------------------------------------------------------------------

VMware Security Advisory

Advisory ID: VMSA-2016-0009

Synopsis: VMware vCenter Server updates address an important

reflective cross-site scripting issue

Issue date: 2016-06-14

Updated on: 2016-06-14 (Initial Advisory)

CVE number: CVE-2015-6931

- ------------------------------------------------------------------------

1. Summary

VMware vCenter Server updates address an important reflective

cross-site scripting issue.

2. Relevant Releases

vCenter Server 5.5 prior to 5.5 update 2d

vCenter Server 5.1 prior to 5.1 update 3d

vCenter Server 5.0 prior to 5.0 update 3g

3. Problem Description

a. Important vCenter Server reflected cross-site scripting issue

The vSphere Web Client contains a reflected cross-site scripting

vulnerability due to a lack of input sanitization. An attacker can

exploit this issue by tricking a victim into clicking a malicious

link.

VMware would like to thank Matt Schmidt for reporting this issue to

us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has

assigned the identifier CVE-2015-6931 to this issue.

Column 4 of the following table lists the action required to

remediate the vulnerability in each release, if a solution is

available.

VMware Product Running Replace with/

Product Version on Apply Patch

============== ======= ======= =============

vCenter Server 6.0 Any not affected

vCenter Server 5.5 Any 5.5 U2d *

vCenter Server 5.1 Any 5.1 U3d *

vCenter Server 5.0 Any 5.0 U3g *

* The client side component of the vSphere Web Client does not need

to be updated to remediate CVE-2015-6931. Updating the vCenter

Server is sufficient to remediate this issue.

4. Solution

Please review the patch/release notes for your product and

version and verify the checksum of your downloaded file.

vCenter Server

--------------

Downloads and Documentation:

http://ift.tt/12flJcv

5. References

http://ift.tt/1UufhWQ

- ------------------------------------------------------------------------

6. Change log

2016-06-14 VMSA-2016-0009

Initial security advisory in conjunction with the release of VMware

vCenter Server 5.0 U3g on 2016-06-14.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:

http://ift.tt/1ePlJlY

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com

bugtraq at securityfocus.com

fulldisclosure at seclists.org

E-mail: security at vmware.com

PGP key at: http://ift.tt/1Uj7UQR

VMware Security Advisories

http://ift.tt/1auBOfo

Consolidated list of VMware Security Advisories

http://ift.tt/1roGCgv

VMware Security Response Policy

http://ift.tt/12flLkC

VMware Lifecycle Support Phases

http://ift.tt/1ytwXD0

Twitter

https://twitter.com/VMwareSRC

Copyright 2016 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----

Version: PGP Desktop 9.8.3 (Build 4028)

Charset: utf-8

wj8DBQFXYOczDEcm8Vbi9kMRApfPAJ0Urm1NrLwTbkY0vsGeXQtS0kWDZQCgmYPj

dGcJx5HCyLJCiIz/FCMpGIU=

=FYiK

-----END PGP SIGNATURE-----

[ reply ]


from SecurityFocus Vulnerabilities http://ift.tt/1Uj9cvl

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.