exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2018-0007

VMware Security Advisory 2018-0007
Posted Feb 8, 2018
Authored by VMware | Site vmware.com

VMware Security Advisory 2018-0007 - VMware Virtual Appliance updates address side-channel analysis due to speculative execution.

tags | advisory
advisories | CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
SHA-256 | ec8f147c16b39decc064b40987ddaf4daf5a97ec067ad903f105fee9b1a0a0d9

VMware Security Advisory 2018-0007

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2018-0007
Severity: Important
Synopsis: VMware Virtual Appliance updates address side-channel
analysis due to speculative execution
Issue date: 2018-02-08
Updated on: 2018-02-08 (Initial Advisory)
CVE number: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754

1. Summary

VMware Virtual Appliance updates address side-channel analysis due
to speculative execution

Note:

This document will focus on VMware Virtual Appliances which are
affected by the known variants of CVE-2017-5753, CVE-2017-5715, and
CVE-2017-5754. For more information please see Knowledge Base article
52264.

These mitigations are part of the Operating System-Specific
Mitigations category described in VMware Knowledge Base article
52245.

2. Relevant Products

vCloud Usage Meter (UM)
Identity Manager (vIDM)
vCenter Server (vCSA)
vSphere Data Protection (VDP)
vSphere Integrated Containers (VIC)
vRealize Automation (vRA)

3. Problem Description

VMware Virtual Appliance Mitigations for Bounds-Check bypass, Branch
Target Injection, and Rogue data cache load issues

CPU data cache timing can be abused to efficiently leak information
out of mis-speculated CPU execution, leading to (at worst) arbitrary
virtual memory read vulnerabilities across local security boundaries
in various contexts. (Speculative execution is an automatic and
inherent CPU performance optimization used in all modern processors.)
Successful exploitation may allow for information disclosure.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifiers CVE-2017-5753 (Bounds Check bypass),
CVE-2017-5715 (Branch Target Injection), CVE-2017-5754 (Rogue data
cache load) to these issues.

Column 5 of the following table lists the action required to
mitigate the observed vulnerability in each release, if a solution
is available.

VMware Product Running Replace with/ Mitigation/
Product Version on Severity Apply Patch Workaround
========== ========= ======= ========= ============= ==========
UM 3.x VA Important Patch Pending KB52467

vIDM 3.x, 2.x VA Important Patch Pending KB52284

vCSA 6.5 VA Important Patch Pending KB52312
vCSA 6.0 VA Important Patch Pending KB52312
vCSA 5.5 VA N/A Unaffected None

VDP 6.x VA Important Patch Pending None

VIC 1.x VA Important 1.3.1 None

vRA 7.x VA Important Patch Pending KB52377
vRA 6.x VA Important Patch Pending KB52497

4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

vSphere Integrated Containers 1.3.1
Downloads and Documentation:
https://my.vmware.com/group/vmware/get-download?downloadGroup=VIC131

5. References

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
https://kb.vmware.com/kb/52264
https://kb.vmware.com/kb/52245
https://kb.vmware.com/kb/52467
https://kb.vmware.com/kb/52284
https://kb.vmware.com/kb/52312
https://kb.vmware.com/kb/52377
https://kb.vmware.com/kb/52497
https://kb.vmware.com/kb/52497

- ------------------------------------------------------------------------

6. Change log

2018-02-08: VMSA-2018-0007
Initial security advisory in conjunction with the release of vSphere
Integrated Containers 1.3.1 on 2018-02-08.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org

E-mail: security at vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC

Copyright 2018 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----

iF0EARECAB0WIQSmJMaUX5+xuU/DnNwMRybxVuL2QwUCWnzCYQAKCRAMRybxVuL2
Q9MwAKCpJO5F7S84R0BU0cmxC6YZD48OmQCg7m5F+rjhYXd3h11mD89Fi8ZGU+g=
=4l0P
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close