VMSA-2016-0020 vRealize Operations update addresses REST API deserialization vulnerability.


1. Summary

vRealize Operations update addresses REST API deserialization vulnerability.

2. Relevant Products
  • vRealize Operations
3. Problem Description

a. vRealize Operations REST API deserialization vulnerability

vRealize Operations contains a deserialization vulnerability in its REST API implementation. This issue may result in a Denial of Service as it allows for writing of files with arbitrary content   and moving existing files into certain folders. The name format of the destination files is predefined and their names cannot be  chosen. Overwriting files is not feasible.

VMware would like to thank Jacob Baines of Tenable Network Security for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7462 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.


4. Solution

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

vRealize Operations
Downloads and Documentation:

6. Change log

2016-11-15 VMSA-2016-0020

Initial security advisory in conjunction with the release of  vRealize Operations 6.4 on 2016-11-15.

Created on November 15, 2016 by Rick Scherer

Posted under Alert.

This blog has 1,299 views.

Tags: , , , ,

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Leave a Comment

Name (required)

Email (required)



More Blog Post