
====================================================================

                               CERT-Renater

                   Note d'Information No. 2016/VULN418
_____________________________________________________________________

DATE                : 20/12/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): VMware ESXi versions 6.0, 5.5, 5.0.

=====================================================================
http://www.vmware.com/security/advisories/VMSA-2016-0023.html
____________________________________________________________________

- ----------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2016-0023
Severity:    Important
Synopsis:    VMware ESXi updates address a cross-site
              scripting issue

Issue date:  2016-12-20
Updated on:  2016-12-20 (Initial Advisory)
CVE number:  CVE-2016-7463

1. Summary

    VMware ESXi updates address a cross-site scripting issue.

2. Relevant Releases

    VMware vSphere Hypervisor (ESXi)

3. Problem Description

    a. Host Client stored cross-site scripting issue

    The ESXi Host Client contains a vulnerability that may allow for
    stored cross-site scripting (XSS). The issue can be introduced by
    an attacker that has permission to manage virtual machines through
    ESXi Host Client or by tricking the vSphere administrator to import
    a specially crafted VM. The issue may be triggered on the system
    from where ESXi Host Client is used to manage the specially crafted
    VM.

    VMware advises not to import VMs from untrusted sources.

    VMware would like to thank Caleb Watt (@calebwatt15) for reporting
    this issue to us.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the identifier CVE-2016-7463 to this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware  Product Running             Replace with/
    Product Version on       Severity    Apply Patch*        Workaround
    ======= ======= =======  ========   =============        ==========
    ESXi     6.5    ESXi    N/A        not affected           N/A
    ESXi     6.0    ESXi    Important  ESXi600-201611102-SG   None
    ESXi     5.5    ESXi    Important  ESXi550-201612102-SG   None

    *The fling version which resolves this issue is 1.13.0.

4. Solution

    Please review the patch/release notes for your product and
    version and verify the checksum of your downloaded file.

    ESXi 6.0
    -------------
    Downloads:
    https://www.vmware.com/patchmgr/findPatch.portal
    Documentation:
    http://kb.vmware.com/kb/2145815

    ESXi 5.5
    ------------
    Downloads:
    https://www.vmware.com/patchmgr/findPatch.portal
    Documentation:
    http://kb.vmware.com/kb/2148194


5. References

    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7463

- -----------------------------------------------------------------------

6. Change log

    2016-12-20 VMSA-2016-0023
    Initial security advisory in conjunction with the release of VMware
    ESXi 5.5 patches on 2016-12-20.

- -----------------------------------------------------------------------

7. Contact

    E-mail list for product security notifications and announcements:
    http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

    This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

    E-mail: security at vmware.com
    PGP key at: https://kb.vmware.com/kb/1055

    VMware Security Advisories
    http://www.vmware.com/security/advisories

    Consolidated list of VMware Security Advisories
    http://kb.vmware.com/kb/2078735

    VMware Security Response Policy
    https://www.vmware.com/support/policies/security_response.html

    VMware Lifecycle Support Phases
    https://www.vmware.com/support/policies/lifecycle.html

    Twitter
    https://twitter.com/VMwareSRC

    Copyright 2016 VMware Inc.  All rights reserved.

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================









