=====================================================================
                                    CERT-Renater

                         Note d'Information No. 2008/VULN068
_____________________________________________________________________

DATE                      : 22/02/2008

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running VMware ESX Server.

======================================================================

- - -------------------------------------------------------------------
                    VMware Security Advisory

Advisory ID:       VMSA-2008-0003
Synopsis:          Moderate: Updated aacraid driver and samba
                    and python service console updates
Issue date:        2008-02-04
Updated on:        2008-02-04 (initial release of advisory)
CVE numbers:       CVE-2007-6015 CVE-2006-7228 CVE-2007-2052
                    CVE-2007-4965 CVE-2007-4308
- - -------------------------------------------------------------------

1. Summary:

    Security updates to aacraid driver, samba and python

2. Relevant releases:

ESX Server 3.0.2 without patches ESX-1003362, ESX-1003359, ESX-1003360
ESX Server 3.0.1 without patches ESX-1003350, ESX-1003347, ESX-1003348
ESX Server 2.5.5 Upgrade Patch 4
ESX Server 2.5.4 Upgrade Patch 15

NOTE: ESX 2.5.4 is in Extended Support and its end of support (Security
       and Bug fixes) is 10/08/2008.  Users should plan to upgrade to at
       least 2.5.5 and preferably the newest release available before the
       end of extended support.

NOTE: ESX 3.0.1 is in Extended Support and its end of support (Security
       and Bug fixes) is 07/31/2008.  Users should plan to upgrade to at
       least 3.0.2 update 1 and preferably the newest release available
       before the end of extended support.

ESX Server versions 3.0.0 and prior to 2.5.4 are no longer in Extended
Support.  Users should upgrade to a supported version of the product.

The VMware Infrastructure Support Life Cycle Policy can be found here:
http://www.vmware.com/support/policies/eos_vi.html

3. Problem description:

  I   Updated aacraid driver

         This patch fixes a flaw in how the aacraid SCSI driver checked
         IOCTL command permissions.  This flaw might allow a local user
         on the service console to cause a denial of service or gain
         privileges. Thanks to Adaptec for reporting this issue.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CVE-2007-4308 to this issue.

         ESX Server 3.0.2 ESX-1003362
         http://download3.vmware.com/software/vi/ESX-1003362.tgz
         md5sum: f828e7c1c00c2b32ebd4f14f92febe16
         http://kb.vmware.com/kb/1003362

         ESX Server 3.0.1 ESX-1003350
         http://download3.vmware.com/software/vi/ESX-1003350.tgz
         md5sum: 490e042c9a726480fe3d3cbc6b4fae5a
         http://kb.vmware.com/kb/1003350

         ESX Server 2.5.4 Upgrade Patch 15
         ESX Server 2.5.5 Upgrade Patch 4

         RPM Updated:
         VMware-esx-drivers-scsi-aacraid_esx30.rpm
         kernel-vmnix.rpm

         VM Shutdown: Yes
         Host Reboot: Yes

  II  Service Console package security updates

      a. Samba

         Alin Rad Pop of Secunia Research found a stack buffer overflow
         flaw in the way Samba authenticates remote users.  A remote
         unauthenticated user could trigger this flaw to cause the Samba
         server to crash or to execute arbitrary code with the
         permissions of the Samba server.

         Note: This vulnerability can be exploited only if the attacker
               has access to the service console network.  The Samba
               client is installed by default in the service console, but
               the Samba server is not.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CVE-2007-6015 to this issue.

         RPM Updated:
         samba-3.0.9-1.3E.14.3.i386.rpm,
         samba-client-3.0.9-1.3E.14.3.i386.rpm,
         samba-common-3.0.9-1.3E.14.3.i386.rpm

         VM Shutdown: No
         Host Reboot: No

         ESX Server 3.0.2 ESX-1003359
         http://download3.vmware.com/software/vi/ESX-1003359.tgz
         md5sum: c1fc3232c76aea150308b2227d9d522e
         http://kb.vmware.com/kb/1003359

         ESX Server 3.0.1 ESX-1003347
         http://download3.vmware.com/software/vi/ESX-1003347.tgz
         md5sum: 60bb8e5136b7ce08171719b42fda60cf
         http://kb.vmware.com/kb/1003347

         ESX Server 2.5.4 Upgrade Patch 15
         ESX Server 2.5.5 Upgrade Patch 4

         Deployment Considerations

         IMPORTANT: The samba-3.0.9-1.3E.14.3vmw RPM is not installed
         with a default installation of ESX Server software, but some
         customers choose to install the Samba application on their
         hosts. VMware recommends against installing such applications in
         the console operating system, but in order to provide a
         complete fix to this security issue, this patch supplies the
         samba-3.0.9-1.3E.14.3vmw RPM. Applying this patch will install
         the RPM while updating the samba-client-3.0.9-1.3E.14.3vmw and
         samba-common-3.0.9-1.3E.14.3vmw RPMs, which are part of a
         default ESX Server software installation. To exclude the
         samba-3.0.9-1.3E.14.3vmw RPM when installing this bundle, use
         the exclude option for the esxupdate utility as follows:

             esxupdate -d <DepotURL> -x samba-3.0.9-1.3E.14.3vmw update

         Here, <DepotURL> is the URL of the depot from which you are
         installing your bundles. See the ESX Server 3 Patch Management
         Guide for more information on advanced options for the esxupdate
         utility.

      b. Python

         Chris Evans of the Google security research team discovered an
         integer overflow issue with the way Python's Perl-Compatible
         Regular Expression (PCRE) module handled certain regular
         expressions.  If a Python application used the PCRE module to
         compile and execute untrusted regular expressions, it might be
         possible to cause the application to crash, or to execute
         arbitrary code with the privileges of the Python interpreter.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CVE-2006-7228 to this issue.

         Piotr Engelking discovered a flaw in Python's locale module
         where strings generated by the strxfrm() function were not
         properly NUL-terminated.  This might result in disclosure of
         data stored in the memory of a Python application using the
         strxfrm() function.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CVE-2007-2052 to this issue.

         Slythers Bro reported multiple integer overflow flaws in
         Python's imageop module.  These could allow an attacker to cause
         a Python application to crash, enter an infinite loop, or
         possibly execute arbitrary code with the privileges of the
         Python interpreter.

         The Common Vulnerabilities and Exposures project (cve.mitre.org)
         has assigned the name CVE-2007-4965 to this issue.

         RPM Updated:
         python-2.2.3-6.8.i386.rpm

         VM Shutdown: Yes
         Host Reboot: Yes

         ESX Server 3.0.2 ESX-1003360
         http://download3.vmware.com/software/vi/ESX-1003360.tgz
         md5sum: 91d08543a3303827f3e07e12ffd45241
         http://kb.vmware.com/kb/1003360

         ESX Server 3.0.1 ESX-1003348
         http://download3.vmware.com/software/vi/ESX-1003348.tgz
         md5sum: b1fa900baa6ab18266f2840579cfe712
         http://kb.vmware.com/kb/1003348

         ESX Server 2.5.4 Upgrade Patch 15
         ESX Server 2.5.5 Upgrade Patch 4

4. Solution:

Please review the Patch notes for your product and version and verify
the md5sum of your downloaded file.

    ESX Server 3.x Patches:
    http://www.vmware.com/download/vi/vi3_patches.html

    ESX Server 2.x Patches:
    http://www.vmware.com/download/esx/esx2_patches.html

    ESX Server 2.5.5 Upgrade Patch 4
    http://download3.vmware.com/software/esx/esx-2.5.5-69113-upgrade.tar.gz
    md5sum: 354fce25ac29411cf5aafecf17f9d446
    http://www.vmware.com/support/esx25/doc/esx-255-200801-patch.html

    ESX Server 2.5.4 Upgrade Patch 15
    http://download3.vmware.com/software/esx/esx-2.5.4-69112-upgrade.tar.gz
    md5sum: a31065571a2da5bb5e69a5ccab6aa467
    http://www.vmware.com/support/esx25/doc/esx-254-200801-patch.html

5. References:

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308

- - -------------------------------------------------------------------
6. Contact:

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

   * security-announce@lists.vmware.com
   * bugtraq@securityfocus.com
   * full-disclosure@lists.grok.org.uk

E-mail:  security@vmware.com

Security web site
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2008 VMware Inc.  All rights reserved.

======================================================================

           =========================================================
           Les serveurs de référence du CERT-Renater
           http://www.urec.fr/securite
           http://www.cru.fr/securite
           http://www.renater.fr
           =========================================================
           + CERT-RENATER          | tel : 01-53-94-20-44          +
           + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
           + 75013 Paris           | email: certsvp@renater.fr     +
           =========================================================




