VMware Security Advisory
1. Summary
VMware ESXi updates address a cross-site scripting issue
2. Relevant Products
- VMware vSphere Hypervisor (ESXi)
3. Problem Description
a. Host Client stored cross-site scripting issue
The ESXi Host Client contains a vulnerability that may allow for stored cross-site scripting (XSS). The issue can be introduced by an attacker that has permission to manage virtual machines through ESXi Host Client or by tricking the vSphere administrator to import a specially crafted VM. The issue may be triggered on the system from where ESXi Host Client is used to manage the specially crafted VM.
VMware advises not to import VMs from untrusted sources.
VMware would like to thank Caleb Watt (@calebwatt15) for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7463 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
*The fling version which resolves this issue is 1.13.0.
4. Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
ESXi 6.0
Downloads:
https://www.vmware.com/patchmgr/findPatch.portal
http://kb.vmware.com/kb/2145815
ESXi 5.5
Downloads:
https://www.vmware.com/patchmgr/findPatch.portal
Documentation:
6. Change log
2016-12-20 VMSA-2016-0023
Initial security advisory in conjunction with the release of VMware ESXi 5.5 patches on 2016-12-20.
'취약점 정보2' 카테고리의 다른 글
넷기어 R8000 공유기 제품군 업데이트 권고 (0) | 2016.12.22 |
---|---|
VirtualBox 5.1.12 업데이트 권고 (0) | 2016.12.22 |
삼성DVR credentials encoded in base64 in cookie header (0) | 2016.12.20 |
tomcat7 보안 업데이트 권고 (0) | 2016.12.20 |
libupnp security update (0) | 2016.12.19 |