Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22403
HistorySep 02, 2009 - 12:00 a.m.

VMSA-2009-0011 VMware Studio 2.0 addresses a security issue in the public beta version of Studio 2.0

2009-09-0200:00:00
vulners.com
19

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


               VMware Security Advisory

Advisory ID: VMSA-2009-0011
Synopsis: VMware Studio 2.0 addresses a security issue in the
public beta version of Studio 2.0
Issue date: 2009-08-31
Updated on: 2009-08-31 (initial release of advisory)
CVE numbers: CVE-2009-2968


  1. Summary

    VMware Studio 2.0 resolves a directory traversal vulnerability that
    was present in the VMware Studio 2.0 public beta.

  2. Relevant releases

    VMware VMware Studio 2.0 public beta

  3. Problem Description

a. Directory traversal vulnerability

Due to incomplete sanitation of user input, a support component of
VMware Studio's web interface can be tricked into uploading a file
to any directory inside the VMware Studio virtual appliance.  This
issue does not affect virtual machines that are created with Studio
2.0 beta.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2009-2968 to this issue.

VMware would like to thank Claudio Criscione of Secure Network
for reporting this issue to us.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VMware Studio  1.0       VMware   not affected
VMware Studio  2.0 beta  VMware   VMware Studio 2.0 build 1017-185256
VMware Studio  2.0       VMware   not affected
  1. Solution

    Please review the patch/release notes for your product and version
    and verify the sha1sum and/or the md5sum of your downloaded file.

    VMware Studio 2.0 build 1017-185256

    http://www.vmware.com/support/developer/studio/
    Release notes:
    http://www.vmware.com/support/developer/studio/studio20/release_notes.html

    VMware Studio appliance in ZIP
    (md5sum:58cb40704d12f4ec329b887ae729aba9)
    (sha1sum:2931a6a4de7e77016d08c6539cab93a6304ab452)

    VMware Studio appliance in OVA
    Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ova
(md5sum:0b0edb02865ae935bcffcccbf346adc2)
(sha1sum:f126339ab0de5b684e60ab7dfd50ddb15f2391cc)

VMware Studio appliance in OVF 1.0
Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ovf
(md5sum:a3dfca29578a75b0440be3419396c85c)
(sha1sum:67f08e73de18ddeea257fefe6475f289d643ad77)

VMware Studio appliance in OVF 0.9
Deployment URL:

http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF09.ovf
(md5sum:959c61270dc872be2f5e65e59480852d)
(sha1sum:ac3c2d612f0b877f10ca607467b6a95b31ed3dd7)

VMDK associated to the OVF 1.0 and OVF 0.9 descriptor
(md5sum:617ec59063d2ba180b19f680fb1b49b1)
(sha1sum:eb1d474cde175a9e042c9613eae31822843394cf)

VMware Studio Plugin for Eclipse in ZIP
(md5sum:9970df718f08f92c053758187c979293)
(sha1sum:2d5a9a8d3d68faa3afd317b148f060a74cbd359a)

  1. References

    CVE numbers
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2968


  1. Change log

2009-08-31 VMSA-2009-0011
Initial security advisory after release of Studio 2.0 on 2009-08-31.


  1. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2009 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iD8DBQFKnLHmS2KysvBH1xkRAlUSAJ90vZzWYrMUgNwmnk1EWRTEyF+pKgCffeLt
sMSBGdvumE+14/pi4woV46Q=
=jbNX
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:22403