[Security-announce] VMSA-2018-0031 – vRealize Operations updates address a local privilege escalation vulnerability


Content-Language: en-US

boundary=”_000_DM6PR05MB6380467DDBC73323D408B82AB9BD0DM6PR05MB6380namp_”

–_000_DM6PR05MB6380467DDBC73323D408B82AB9BD0DM6PR05MB6380namp_

Content-Transfer-Encoding: quoted-printable

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————
VMware Security Advisory

Advisory ID: VMSA-2018-0031
Severity: Important
Synopsis: vRealize Operations updates address a local privilege
escalation vulnerability
Issue date: 2018-12-18
Updated on: 2018-12-18 (Initial Advisory)
CVE number: CVE-2018-6978

1. Summary

vRealize Operations updates address a local privilege escalation
vulnerability

2. Relevant Products

vRealize Operations (vROps)

3. Problem Description

Privilege escalation vulnerability in support scripts

vROps contains a local privilege escalation vulnerability due to
improper permissions of support scripts. Admin** user of the vROps
application with shell access may exploit this issue to elevate the
privileges to root on a machine where vROps is installed.

**The admin user (non-sudoer) should not be confused with root of
the vROps machine.

VMware would like to thank Alessandro Zanni, pentester at OVH for
reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2018-6978 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigation
Product Version on Severity Apply patch Workaround
=
=

vROps 7.x VA Important 7.0.0.11287810 None
vROps 6.7.x VA Important 6.7.0.11286837 None
vROps 6.6.x VA Important 6.6.1.11286876 None

4. Solution

Please review the patch/release notes for your product and version and
verify the checksum of your downloaded file.

vRealize Operations 7.0.0.11287810
Downloads and Documentation:
https://my.vmware.com/web/vmware/details
?downloadGroupVROPS-700&productId788&rPId26497

vRealize Operations 6.7.0.11286837
Downloads and Documentation:
https://my.vmware.com/web/vmware/details
?downloadGroupVROPS-670&productId735&rPId22153

vRealize Operations 6.6.1.11286876
Downloads and Documentation:
https://my.vmware.com/web/vmware/details
?downloadGroupVROPS-661&productId656&rPId21231

5. References

https://cve.mitre.org/cgi-bin/cvename.cgi?nameCVE-2018-6978

– ————————————————————————

6. Change log

VMSA-2018-0031 2018-12-18
Initial security advisory in conjunction with the release of vROps
6.6.x, 6.7.x and 7.x patches on 2018-12-18.

– ————————————————————————
7. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org

E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
https://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter

Copyright 2018 VMware Inc. All rights reserved.

—–BEGIN PGP SIGNATURE—–
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFcGSXBDEcm8Vbi9kMRAkgPAKDAF8dPv5RXU2Gh+rzZbvnbqupufQCg/nd9
O+aIUvKvFCIaNLiL5qws5DI
BVV1
—–END PGP SIGNATURE—–

–_000_DM6PR05MB6380467DDBC73323D408B82AB9BD0DM6PR05MB6380namp_

Content-Transfer-Encoding: quoted-printable

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————
            &nb=
sp;           VMware Secu=
rity Advisory

Advisory ID: VMSA-2018-0031
Severity:    Important
Synopsis:    vRealize Operations updates address a local pri=
vilege
             es=
calation vulnerability
Issue date:  2018-12-18
Updated on:  2018-12-18 (Initial Advisory)
CVE number:  CVE-2018-6978

1. Summary

   vRealize Operations updates address a local privilege escalati=
on
   vulnerability

2. Relevant Products
   
   vRealize Operations (vROps)

3. Problem Description
    
   Privilege escalation vulnerability in support scripts
   
   vROps contains a local privilege escalation vulnerability due =
to
   improper permissions of support scripts. Admin** user of the v=
ROps
application with shell access may exploit this issue to elevate the
privileges to root on a machine where vROps is installed.
   
   **The admin user (non-sudoer) should not be confused with root=
of
   the vROps machine.
   
   VMware would like to thank Alessandro Zanni, pentester at OVH =
for
   reporting this issue to us.
   
   The Common Vulnerabilities and Exposures project (cve.mitre.or=
g) has
   assigned the identifier CVE-2018-6978 to this issue.
   
   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.
   
   VMware        Product Runni=
ng           Replace with=
/   Mitigation
   Product       Version on &n=
bsp;    Severity  Apply patch     W=
orkaround
   =
=
 
    vROps         7.=
x      VA    Important 7.0.0.112878=
10    None    
    vROps         6.=
7.x    VA    Important 6.7.0.11286837 &n=
bsp;  None    
    vROps         6.=
6.x    VA    Important 6.6.1.11286876 &n=
bsp;  None    
    
 
4. Solution

   Please review the patch/release notes for your product and ver=
sion and
verify the checksum of your downloaded file.
    
   vRealize Operations 7.0.0.11287810
   Downloads and Documentation:
   https://my.vmware.com/web/vmware/details
   ?downloadGroupVROPS-700&productId788&rPId2649=
7

   vRealize Operations 6.7.0.11286837
   Downloads and Documentation:
   https://my.vmware.com/web/vmware/details
   ?downloadGroupVROPS-670&productId735&rPId2215=
3
   
   
   vRealize Operations 6.6.1.11286876
   Downloads and Documentation:
   https://my.vmware.com/web/vmware/details
   ?downloadGroupVROPS-661&productId656&rPId2123=
1
    
 5. References

   https://cve.mitre.org/cgi-bin/cvename.cgi?nameCVE-2018-6978=

– ————————————————————————

6. Change log

   VMSA-2018-0031 2018-12-18
   Initial security advisory in conjunction with the release of v=
ROps
   6.6.x, 6.7.x and 7.x patches on 2018-12-18.
   
– ————————————————————————
7. Contact

   E-mail list for product security notifications and announcemen=
ts:
   https://lists.vmware.com/cgi-bin/mailman/listinfo/security-ann=
ounce

   This Security Advisory is posted to the following lists:
   
     security-announce@lists.vmware.com
     bugtraq@securityfocus.com
     fulldisclosure@seclists.org

   E-mail: security@vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   https://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html=

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
   
   VMware Security & Compliance Blog
   https://blogs.vmware.com/security

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc.  All rights reserved.

—–BEGIN PGP SIGNATURE—–
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFcGSXBDEcm8Vbi9kMRAkgPAKDAF8dPv5RXU2Gh+rzZbvnbqupufQCg/nd9
O+aIUvKvFCIaNLiL5qws5DI
BVV1
—–END PGP SIGNATURE—–

–_000_DM6PR05MB6380467DDBC73323D408B82AB9BD0DM6PR05MB6380namp_–

MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
https://lists.vmware.com/mailman/listinfo/security-announce