VMware product updates address a critical deserialization vulnerability
|VMware Security Advisory|
|Synopsis:||VMware product updates address a critical deserialization vulnerability|
A deserialization vulnerability involving Apache Commons-collections and a specially constructed chain of classes exists. Successful exploitation could result in remote code execution, with the permissions of the application using the Commons-collections library.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-6934 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available
|vRealize Orchestrator||7.0||Any||Not Affected|
|vCenter Orchestrator||4.2.x, 5.x||Any||KB2141244|
|vRealize Operations||6.x||Windows||6.2 *|
|vCenter Operations||5.x||Windows||Patch Pending *|
|vCenter Application Discovery Manager (vADM)||7.x||Any||Patch Pending|
* Exploitation of the issue on vRealize Operations, vCenter Operations, and vCenter Application Discovery Manager is limited to local privilege escalation.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vRealize Orchestrator 6.x and vCenter Orchestrator 5.x
Downloads and Documentation:
vRealize Operations 6.x
2015-12-18 VMSA-2015-0009 Initial security advisory in conjunction
with the release of vRealize Orchestrator 6.x and vCenter Orchestrator 5.x
patches on 2015-12-18.
Updated security advisory in conjunction with the release of vRealize
Operations 6.2 on 2016-01-28. Added a note below the table in section 3.a
that exploitation of this issue in vCenter Application Discovery
Manager is limited to local privilege escalation.
Created on January 29, 2016 by Rick Scherer
Posted under Alert.
This blog has 30,824 views.