vRealize Operations update addresses REST API deserialization vulnerability.
2. Relevant Products
- vRealize Operations
3. Problem Description
a. vRealize Operations REST API deserialization vulnerability
vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be chosen. Overwriting files is not feasible.
VMware would like to thank Jacob Baines of Tenable Network Security for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7462 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
Downloads and Documentation:
6. Change log
Initial security advisory in conjunction with the release of vRealize Operations 6.4 on 2016-11-15.
Created on November 15, 2016 by Rick Scherer
Posted under Alert.
This blog has 1,082 views.