VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091126-001
VMware Products Multiple Code Execution and Security Bypass Vulnerability
http://lists.vmware.com/pipermail/security-announce/2009/000070.html

Updated Java JRE packages and Tomcat packages address several security issues. Updates for the ESX Service Console and vMA include kernel, ntp, Python, bind libxml, libxml2, curl and gnutil packages. ntp is also updated for ESXi userworlds.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-11-26
Source Information Category:
Advisory, Alert
Last Updated:
2009-11-26




Affected Product Tags
cpe:/a:vmware:esx_server     (VMWare ESX Server)
cpe:/a:vmware:server     (VMware Server)
lapt:/a:vmware:esxi     (VMware ESXi)
lapt:/a:vmware:vcenter_server     (VMware vCenter Server)
lapt:/a:vmware:vma     (vSphere Management Assistant)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
Medium-High [?]
X High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
X Complex [?]

Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
X None [?]

Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.