---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: VMware ESX and vMA Update for Multiple Packages SECUNIA ADVISORY ID: SA37471 VERIFY ADVISORY: http://secunia.com/advisories/37471/ DESCRIPTION: VMware has issued updates for ESX and vMA. These fix some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service), by malicious users to cause a DoS and potentially gain escalated privileges, and by malicious people to disclose potentially sensitive information, conduct spoofing attacks, cause a DoS, or compromise a vulnerable system. For more information: SA23073 SA25190 SA26837 SA27555 SA28105 SA30719 SA31305 SA33656 SA33938 SA33977 SA34033 SA34084 SA34422 SA34608 SA34614 SA34644 SA35106 SA35107 SA35130 SA35265 SA35801 SA35983 SA35985 SA36038 SA36136 SA36207 SA36238 SA36266 SA36278 SOLUTION: VMware ESX 4.0: Apply ESX400-200911238-SG, ESX400-200911201-UG, ESX400-200911235-SG, ESX400-200911237-SG, ESX400-200911234-SG, ESX400-200911232-SG, and ESX400-200911233-SG. VMware ESX 3.5, 3.0.3: A patch is still pending. VMware ESX 2.5.5: A patch is still pending. VMware vMA 4.0: Apply Patch 2. ORIGINAL ADVISORY: VMSA-2009-0016: http://lists.vmware.com/pipermail/security-announce/2009/000070.html OTHER REFERENCES: SA23073: http://secunia.com/advisories/23073/ SA25190: http://secunia.com/advisories/25190/ SA26837: http://secunia.com/advisories/26837/ SA27555: http://secunia.com/advisories/27555/ SA28105: http://secunia.com/advisories/28105/ SA30719: http://secunia.com/advisories/30719/ SA31305: http://secunia.com/advisories/31305/ SA33656: http://secunia.com/advisories/33656/ SA33938: http://secunia.com/advisories/33938/ SA33977: http://secunia.com/advisories/33977/ SA34033: http://secunia.com/advisories/34033/ SA34084: http://secunia.com/advisories/34084/ SA34422: http://secunia.com/advisories/34422/ SA34608: http://secunia.com/advisories/34608/ SA34614: http://secunia.com/advisories/34614/ SA34644: http://secunia.com/advisories/34644/ SA35106: http://secunia.com/advisories/35106/ SA35107: http://secunia.com/advisories/35107/ SA35130: http://secunia.com/advisories/35130/ SA35265: http://secunia.com/advisories/35265/ SA35801: http://secunia.com/advisories/35801/ SA35983: http://secunia.com/advisories/35983/ SA35985: http://secunia.com/advisories/35985/ SA36038: http://secunia.com/advisories/36038/ SA36136: http://secunia.com/advisories/36136/ SA36207: http://secunia.com/advisories/36207/ SA36238: http://secunia.com/advisories/36238/ SA36266: http://secunia.com/advisories/36266/ SA36278: http://secunia.com/advisories/36278/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------