Search the VMware Knowledge Base (KB)
View by Article ID

VMware ESX Server 3.5, Patch ESX350-200805508-SG: Security Update to cim-smwg (1004644)

  • 4 Ratings

Details

Release Date: 03 JUNE 2008
Document Last Updated: 23 JUNE 2008 - added note to Deployment Considerations

 

Download Size: 
1.9 MB
Download Filename:
ESX350-200805508-SG.zip
md5sum:
3ff8c06d4a9dd406f64f89c51bf26d12


Product Versions ESX Server 3.5
Patch Classification Security
Supersedes ESX350-200802414-BG
ESX350-200803201-UG
Requires ESX350-200805502-BG
Virtual Machine Migration or Reboot Required No
ESX Server Host Reboot Required No
PRs Fixed 226410
Affected Hardware  N/A
Affected Software  N/A
RPMs Included

cim-smwg

Related CVE numbers CVE-2008-2097


Solution

Summaries and Symptoms

This patch provides a security update to Openwsman that fixes an invalid content-length vulnerability. (PR 226410)

Openwsman is a system management platform that implements the Web Services Management protocol (WS-Management). It is installed and running by default. It is used in the service console of ESX and in ESXi.

The Openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable to a privilege escalation flaw, which might allow users with non-privileged ESX or VirtualCenter accounts to gain root privileges.

To exploit this flaw, an attacker would need a local ESX account or a VirtualCenter account with the Host.Cim.CimInteraction permission.

Systems with no local ESX accounts and no VirtualCenter accounts with the Host.Cim.CimInteraction permission are not vulnerable.

This flaw cannot be exploited by users without valid login credentials.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-2097 to this issue.

Deployment Considerations

Before installing this patch through esxupdate or Update Manager, you must stop the Openwsman service and restart it after applying the patch.
 
Note: If the Openwsman service is not stopped before installing this patch, the service will not be in a running state after installation. The ESX host will require a reboot.
  1. Log in to the service console as root.

  2. Stop the Openwsman service:

    service wsman stop

  3. Install this patch.

  4. Restart the Openwsman service:

    service wsman start

Patch Download and Installation

See the VMware Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX Server 3.5 hosts.

To update ESX Server 3.5 hosts when not using Update Manager, download the most recent patch bundle from http://www.vmware.com/download/vi/vi3_patches_35.html and install the bundle using esxupdate from the command line of the host. For more information, see the ESX Server 3 Patch Management Guide.

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 4 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.

What can we do to improve this information? (4000 or fewer characters)




Please enter the Captcha code before clicking Submit.
  • 4 Ratings
Actions
KB: