VMware ESX Server 3.5, Patch ESX350-200805508-SG: Security Update to cim-smwg (1004644)
Release Date: 03 JUNE 2008
Document Last Updated: 23 JUNE 2008 - added note to Deployment Considerations
Summaries and Symptoms
Openwsman is a system management platform that implements the Web Services Management protocol (WS-Management). It is installed and running by default. It is used in the service console of ESX and in ESXi.
The Openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable to a privilege escalation flaw, which might allow users with non-privileged ESX or VirtualCenter accounts to gain root privileges.
To exploit this flaw, an attacker would need a local ESX account or a VirtualCenter account with the Host.Cim.CimInteraction permission.
Systems with no local ESX accounts and no VirtualCenter accounts with the Host.Cim.CimInteraction permission are not vulnerable.
This flaw cannot be exploited by users without valid login credentials.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-2097 to this issue.
Log in to the service console as root.
- Stop the Openwsman service:
service wsman stop
Install this patch.
Restart the Openwsman service:
service wsman start
Patch Download and Installation
See the VMware Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX Server 3.5 hosts.
To update ESX Server 3.5 hosts when not using Update Manager, download the most recent patch bundle from http://www.vmware.com/download/vi/vi3_patches_35.html and install the bundle using esxupdate from the command line of the host. For more information, see the ESX Server 3 Patch Management Guide.