-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2009-0011 Synopsis: VMware Studio 2.0 addresses a security issue in the public beta version of Studio 2.0 Issue date: 2009-08-31 Updated on: 2009-08-31 (initial release of advisory) CVE numbers: CVE-2009-2968 - ------------------------------------------------------------------------ 1. Summary VMware Studio 2.0 resolves a directory traversal vulnerability that was present in the VMware Studio 2.0 public beta. 2. Relevant releases VMware VMware Studio 2.0 public beta 3. Problem Description a. Directory traversal vulnerability Due to incomplete sanitation of user input, a support component of VMware Studio's web interface can be tricked into uploading a file to any directory inside the VMware Studio virtual appliance. This issue does not affect virtual machines that are created with Studio 2.0 beta. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-2968 to this issue. VMware would like to thank Claudio Criscione of Secure Network for reporting this issue to us. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VMware Studio 1.0 VMware not affected VMware Studio 2.0 beta VMware VMware Studio 2.0 build 1017-185256 VMware Studio 2.0 VMware not affected 4. Solution Please review the patch/release notes for your product and version and verify the sha1sum and/or the md5sum of your downloaded file. VMware Studio 2.0 build 1017-185256 ----------------------------------- http://www.vmware.com/support/developer/studio/ Release notes: http://www.vmware.com/support/developer/studio/studio20/release_notes.html VMware Studio appliance in ZIP (md5sum:58cb40704d12f4ec329b887ae729aba9) (sha1sum:2931a6a4de7e77016d08c6539cab93a6304ab452) VMware Studio appliance in OVA Deployment URL: http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ova (md5sum:0b0edb02865ae935bcffcccbf346adc2) (sha1sum:f126339ab0de5b684e60ab7dfd50ddb15f2391cc) VMware Studio appliance in OVF 1.0 Deployment URL: http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF10.ovf (md5sum:a3dfca29578a75b0440be3419396c85c) (sha1sum:67f08e73de18ddeea257fefe6475f289d643ad77) VMware Studio appliance in OVF 0.9 Deployment URL: http://download3.vmware.com/software/studio/studio20/VMware_Studio-2.0.0.1017-185256_OVF09.ovf (md5sum:959c61270dc872be2f5e65e59480852d) (sha1sum:ac3c2d612f0b877f10ca607467b6a95b31ed3dd7) VMDK associated to the OVF 1.0 and OVF 0.9 descriptor (md5sum:617ec59063d2ba180b19f680fb1b49b1) (sha1sum:eb1d474cde175a9e042c9613eae31822843394cf) VMware Studio Plugin for Eclipse in ZIP (md5sum:9970df718f08f92c053758187c979293) (sha1sum:2d5a9a8d3d68faa3afd317b148f060a74cbd359a) 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2968 - ------------------------------------------------------------------------ 6. Change log 2009-08-31 VMSA-2009-0011 Initial security advisory after release of Studio 2.0 on 2009-08-31. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2009 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (MingW32) iD8DBQFKnLHmS2KysvBH1xkRAlUSAJ90vZzWYrMUgNwmnk1EWRTEyF+pKgCffeLt sMSBGdvumE+14/pi4woV46Q= =jbNX -----END PGP SIGNATURE-----