-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2018-0031 Severity: Important Synopsis: vRealize Operations updates address a local privilege escalation vulnerability Issue date: 2018-12-18 Updated on: 2018-12-18 (Initial Advisory) CVE number: CVE-2018-6978 1. Summary vRealize Operations updates address a local privilege escalation vulnerability 2. Relevant Products vRealize Operations (vROps) 3. Problem Description Privilege escalation vulnerability in support scripts vROps contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin** user of the vROps application with shell access may exploit this issue to elevate the privileges to root on a machine where vROps is installed. **The admin user (non-sudoer) should not be confused with root of the vROps machine. VMware would like to thank Alessandro Zanni, pentester at OVH for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6978 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation Product Version on Severity Apply patch Workaround ============= ======= ======= ========= ============== ========== vROps 7.x VA Important 7.0.0.11287810 None vROps 6.7.x VA Important 6.7.0.11286837 None vROps 6.6.x VA Important 6.6.1.11286876 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vRealize Operations 7.0.0.11287810 Downloads and Documentation: https://my.vmware.com/web/vmware/details ?downloadGroup=VROPS-700&productId=788&rPId=26497 vRealize Operations 6.7.0.11286837 Downloads and Documentation: https://my.vmware.com/web/vmware/details ?downloadGroup=VROPS-670&productId=735&rPId=22153 vRealize Operations 6.6.1.11286876 Downloads and Documentation: https://my.vmware.com/web/vmware/details ?downloadGroup=VROPS-661&productId=656&rPId=21231 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6978 - ------------------------------------------------------------------------ 6. Change log VMSA-2018-0031 2018-12-18 Initial security advisory in conjunction with the release of vROps 6.6.x, 6.7.x and 7.x patches on 2018-12-18. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFcGSXBDEcm8Vbi9kMRAkgPAKDAF8dPv5RXU2Gh+rzZbvnbqupufQCg/nd9 O+aIUvKvFCIaNLiL5qws5DI= =BVV1 -----END PGP SIGNATURE-----