---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: VMware ESX Server Multiple Security Updates SECUNIA ADVISORY ID: SA26909 VERIFY ADVISORY: http://secunia.com/advisories/26909/ CRITICAL: Highly critical IMPACT: Security Bypass, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: VMware ESX Server 3.x http://secunia.com/product/10757/ VMware ESX Server 2.x http://secunia.com/product/2125/ DESCRIPTION: VMware has issued an update for VMware ESX Server. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, perform certain actions with escalated privileges, or to cause a DoS (Denial of Service), by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA12498 SA20370 SA21100 SA21713 SA21721 SA23904 SA24905 SA25232 SA25800 SOLUTION: Apply patches. -- VMware ESX 3.0.2 -- Patch Bundle ESX-1001725: http://www.vmware.com/support/vi3/doc/esx-1001725-patch.html md5sum 75aa49eecec2e84eb41a4c26683d4c7a Patch Bundle ESX-1001726: http://www.vmware.com/support/vi3/doc/esx-1001726-patch.html md5sum ac55c65ddc2142a292648765e9dcb583 Patch Bundle ESX-1001727: http://www.vmware.com/support/vi3/doc/esx-1001727-patch.html md5sum bd137cbf65b20dae3aaf422a559f92a1 Patch Bundle ESX-1001728: http://www.vmware.com/support/vi3/doc/esx-1001728-patch.html md5sum a33f0cc5b1cfc68683c4d8643c52775c Patch Bundle ESX-1001729: http://www.vmware.com/support/vi3/doc/esx-1001729-patch.html md5sum 1b2d32dc805971703bb2c8c047c6144a Patch Bundle ESX-1001730: http://www.vmware.com/support/vi3/doc/esx-1001730-patch.html md5sum 7f91450c665065c9998a635bbe4c42db Patch Bundle ESX-1001731: http://www.vmware.com/support/vi3/doc/esx-1001731-patch.html md5sum c349b83065f5b06cee34bae90a5a01b3 -- VMware ESX 3.0.1 -- Patch Bundle ESX-1001213: http://www.vmware.com/support/vi3/doc/esx-1001213-patch.html md5sum 4e942e5b47f90654696910fb8b10b144 Patch Bundle ESX-1001214: http://www.vmware.com/support/vi3/doc/esx-1001214-patch.html md5sum 1e63db1cc7605830b16306a35bccd878 Patch Bundle ESX-1001691: http://www.vmware.com/support/vi3/doc/esx-1001691-patch.html md5sum e288a71c4953aa6724ce53879c663f81 Patch Bundle ESX-1001692: http://www.vmware.com/support/vi3/doc/esx-1001692-patch.html md5sum 27edbac467107cc1fe6c78a839ce2144 Patch Bundle ESX-1001693: http://www.vmware.com/support/vi3/doc/esx-1001693-patch.html md5sum a11191b59761b6afb68ea73e9e6456d0 Patch Bundle ESX-1001694: http://www.vmware.com/support/vi3/doc/esx-1001694-patch.html md5sum 6ce5d882d6fe9e714ce48f719cefb182 Patch Bundle ESX-1001723: http://www.vmware.com/support/vi3/doc/esx-1001723-patch.html md5sum 9a31d1718d6c063cf978305b84637c40 Patch Bundle ESX-8253547: http://www.vmware.com/support/vi3/doc/esx-8253547-patch.html md5sum 90702b54fb6197a6680f141ad8c435fa Patch Bundle ESX-8567382: http://www.vmware.com/support/vi3/doc/esx-8567382-patch.html md5sum 230a7c7ceec8bd581110ef9303a480fc -- VMware ESX 3.0.0 -- Patch Bundle ESX-1001204: http://www.vmware.com/support/vi3/doc/esx-1001204-patch.html md5sum 08bfdec038ea900c72f04e8d50b2db62 Patch Bundle ESX-1001205: http://www.vmware.com/support/vi3/doc/esx-1001205-patch.html md5sum e6b818cf885d5fd5f93d33b27051df83 Patch Bundle ESX-1001206: http://www.vmware.com/support/vi3/doc/esx-1001206-patch.html md5sum bd552eb70624164067039525941ce82a Patch Bundle ESX-1001207: http://www.vmware.com/support/vi3/doc/esx-1001207-patch.html md5sum acad9bce49ac9398ab1ee502980b49cb Patch Bundle ESX-1001208: http://www.vmware.com/support/vi3/doc/esx-1001208-patch.html md5sum f3e26b66682191e024a9b094a063837f Patch Bundle ESX-1001209: http://www.vmware.com/support/vi3/doc/esx-1001209-patch.html md5sum 1c7adad00a20f9e7ba1fbe1663ad4d66 Patch Bundle ESX-1001210: http://www.vmware.com/support/vi3/doc/esx-1001210-patch.html md5sum c1fb76ac529966bf65cc98cc5e5e88bb Patch Bundle ESX-1001211: http://www.vmware.com/support/vi3/doc/esx-1001211-patch.html md5sum 3f30f6a1a28e6ff4c10d5e44864d327e Patch Bundle ESX-1001212: http://www.vmware.com/support/vi3/doc/esx-1001212-patch.html md5sum 2bc08369d3410fa59d353e45830ae9f5 NOTE: The vendor recommends users to update to version 3.0.1 as 3.0.0 is nearing its End-of-life. -- VMware ESX 2.5.4 -- Apply patch 10 (Build# 53326) -- VMware ESX 2.5.3 -- Apply patch 13 (Build# 52488) -- VMware ESX 2.1.3 -- Apply patch 8 (Build# 53228) -- VMware ESX 2.0.2 -- Apply patch 8 (Build# 52650) ORIGINAL ADVISORY: VMWare (via Full-Disclosure): http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html OTHER REFERENCES: SA12498: http://secunia.com/advisories/12498/ SA20370: http://secunia.com/advisories/20370/ SA21100: http://secunia.com/advisories/21100/ SA21713: http://secunia.com/advisories/21713/ SA21721: http://secunia.com/advisories/21721/ SA23904: http://secunia.com/advisories/23904/ SA24905: http://secunia.com/advisories/24905/ SA25232: http://secunia.com/advisories/25232/ SA25800: http://secunia.com/advisories/25800/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------