-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0144 Title: VMware View Server directory traversal [1] Version history: 14.12.2012 Initial publication Summary ======= VMware View releases address a critical directory traversal vulnerability in the View Connection Server and View Security Server. CVE-2012-5978 [2] Vulnerable systems ================== VMware View 5.x prior to version 5.1.2 VMware View 4.x prior to version 4.6.2 Original Details ================ VMware View Server directory traversal VMware View contains a critical directory traversal vulnerability that allows an unauthenticated remote attacker to retrieve arbitrary files from affected View Servers. Exploitation of this issue may expose sensitive information stored on the server. Workarounds This vulnerability affects both the View Connection Server and the View Security Server; VMware recommends that customers immediately update both servers to a fixed version of View. Customers who are unable to immediately update their View Servers should consider the following options: Disable Security Server Disabling the Security Server will prevent exploitation of this vulnerability over untrusted remote networks. To restore functionality for remote users, allow them to connect to the Connection Server via a VPN. Block directory traversal attempts It may be possible to prevent exploitation of this issue by blocking directory traversal attacks with an intrusion protection system or application layer firewall. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ======== ======= ======= ================= View 5.x Windows View 5.1.2 View 4.x Windows View 4.6.2 What can you do? ================ View 5.1.2 - --------------------------- http://downloads.vmware.com/d/info/desktop_downloads/vmware_view/5_1 Release Notes https://www.vmware.com/support/view51/doc/view-512-release-notes.html VMware View Connection Server (32-bit) VMware-viewconnectionserver-5.1.2-912971.exe md5sum: 966d158be1d14268f9ef5623e0572691 sha1sum: 39e3a9205516488743df361e086faa59387e039e VMware View Connection Server (64-bit) VMware-viewconnectionserver-x86_64-5.1.2-912971.exe md5sum: c4f791d3d141032cd88b9075e9680b90 sha1sum: 8866e3abae8059264672b1a8ff23a8372f620b1d View 4.6.2 - --------------------------- http://downloads.vmware.com/d/info/desktop_downloads/vmware_view/4_6 Release Notes https://www.vmware.com/support/view46/doc/view-462-release-notes.html VMware View Connection Server (32-bit) VMware-viewconnectionserver-4.6.2-916912.exe md5sum: 77ec27c0514afa179a62ecee410231a4 sha1sum: 7f5219d833366429777f5bd79323d03ccbea5b71 VMware View Connection Server (64-bit) VMware-viewconnectionserver-x86_64-4.6.2-916912.exe md5sum: d18de68abdb4fc52e3be65c5eca4e78b sha1sum: 61add81d978e8a3e68fbe64e3fdc9a6b00c What to tell your users? ======================== N/A More information ================ [1] http://www.vmware.com/security/advisories/VMSA-2012-0017.html [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5978 Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJQyzFVAAoJEPpzpNLI8SVoG5QP/RBs3hdy02UWhMQLEi1L9NjC +hazokjdRrb6+6SZxxM4whFRndP4QnxROO/cBGDTFiBT9FOlDQLyLqBIO5aC4nT7 cmq9PkXKtbEeDEGNdrZpT9YkhNV5vtqW6EbtyaY8d7PzIe0v5k3CNL17c1uNFSqD msMRkbXgV+sWkiqaRjB5Zsth0PAVOyJJYzPQB+5+wXajcIFtMuQznqGx2kX8sKrT Fw3v72elYFp4UAvErWsygzG9/chz8DN0feRXGbPqRrEoMKtF+Go5i30mss1BTWK1 5Rf+mzJ6tQf6GLw316XfTxQoYZydTwhoQfBErX6+H1WzRPHFmR3F+K+AXEIfuOX+ xNQAJhwec9d/QXj4WC9MWLJpkNxnfjt/54WxIu7UeuJAsu5HYjBJ3odI5CCm7BRg 75rQHhACIhPRd/i41uMu8aFy2cf4TnhO+xmCXQ0qWePV505BRqjJMjjWGPSCS296 Sdhw+LjsqSyXpL8dAb7aWKq+8UyiBRMXxp7K8axoFD+kSPLTJAJepQ4nRlt31nsF AjfwRJ3TkCLEM88wz0aUljYJLqRphQDtiIgwRc2xxGfYA0leCEUAOKrL4ykM9K7i Dzw3PMRGyXSz8lDRgFSUKF1e8eDIyh27738RGg55xva0LCBU8P0sZoOPEnyiw0vl cxOvmQRUkKwUySQSgLpX =cOeO -----END PGP SIGNATURE-----