VMware ESX Server 3.5, Patch ESX350-200805506-SG: Security Update to the Service Console for Tcl/Tk (1004642)
Release Date: 03 JUNE 2008
Document Last Updated: 03 JUNE 2008
Summaries and Symptoms
Tk is the standard GUI not only for Tcl, but for many other dynamic languages, and can produce rich, native applications that run unchanged across Windows, Mac OS X, Linux and more.
Tk's GIF image handling contained an input validation flaw which could allow a malicious user to alter a GIF file in a way that leveraged this flaw to initiate a buffer overflow and cause a crash or, potentially, execute code with the privileges of the application using the Tk graphical toolkit.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-0553 to this issue.
Tk's animated GIF image handling contained a buffer overflow flaw in which an animated GIF containing an initial image smaller than subsequent images could cause a crash or, potentially, execute code with the privileges of the application using the Tk library.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-5378 to this issue.
The Tcl regular expression handling engine contained a flaw, which was first discovered in the Tcl regular expression engine used in the PostgreSQL database server, that resulted in an infinite loop when processing certain regular expressions.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-4772 to this issue.
None beyond the required patch bundle listed in the table, above.
Patch Download and Installation
See the VMware Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX Server 3.5 hosts.
To update ESX Server 3.5 hosts when not using Update Manager, download the most recent patch bundle from http://www.vmware.com/download/vi/vi3_patches_35.html and install the bundle using esxupdate from the command line of the host. For more information, see the ESX Server 3 Patch Management Guide.