Sunday 4 October 2015

VMware vCenter and ESXi fall foul of remote code execution bugs

Users of vCenter and ESXi should update their installations now to avoid the chance of remote code execution occurring on their host machines.

A configuration insecurity Java Management Extensions (JMX) In VMware vCenter was trapped like a feat would cause code execution on the host machines.
One of the discoverers of the security hole elements 7 Doug McLeod, told The vulnerability allows access to the server machine system of the virtual machine, and resulted in a total commitment to the environment.
"VMware vCenter Server provides a centralized platform for managing your VMware vSphere so you can automate and provide virtual infrastructure. VMware vCenter was found to bind to a cell JMX RMI unauthenticated / service network" said Advisory 7 elements.

 
Since the JMX service does not require authentication, a user could call to load a managed bean from a remote URL may point to a JAR file containing the code, called When would lead to remote code execution.
"Now with the tools available, is trivial to take complete control over a vulnerable instance of vCenter exercise," Mcleod wrote in a blog.
"The attack vector is already known Metasploit gun With two separate modules and operate, composed of Java class files, compiled and executed when it makes a request to the server for execution."
VCenter Server versions 5.0 through 6.0 are vulnerable through the feat with VMware release patches available. Reported Mcleod said VMware vulnerability to February 27, 2015.

 
Mcleod was not the only search engine vulnerability to an anonymous researcher Thanking VMware HP Zero Day Initiative, and on its board.
In the same advice, she reported that VMware ESXi versions 5.0, 5.1 and 5.5 have been affected by an error of remote code execution, too.
"VMware ESXi contains a double free vulnerability in SLPDProcessMessage () function OpenSLP. The exploitation of this issue could allow an unauthenticated attacker to execute remote code on the ESXi host," VMware Said.

 
"VMware would like to thank Tang Qinghao Qihu this number 360 to indicate to us."
It was the relationship of speculation that could be EMC VMware on the rocks.
If this measure were to occur, EMC senior vice president Jon Peirce He told ZDNet EMC would be a good position to handle the changes that may occur.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.