==================================================================== CERT-Renater Note d'Information No. 2017/VULN229 _____________________________________________________________________ DATE : 16/08/2017 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running VMware NSX-V Edge versions prior to 6.3.3, 6.2.8. ===================================================================== https://lists.vmware.com/pipermail/security-announce/2017/000384.html ____________________________________________________________________ VMware Security Advisory Advisory ID: VMSA-2017-0014 Severity: Important Synopsis: VMware NSX-V Edge updates address OSPF Protocol LSA DoS Issue date: 2017-08-10 Updated on: 2017-08-10 (Initial Advisory) CVE number: CVE-2017-4920 1. Summary VMware NSX-V Edge updates address OSPF Protocol LSA Denial of Service. 2. Relevant Products VMware NSX-V Edge 3. Problem Description a. VMware NSX-V Edge OSPF Protocol LSA Denial of Service VMware NSX-V implementation of the OSPF protocol doesn’t correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity. Note: The issue cannot be exploited in case the OSPF protocol is not configured. At setup time, no particular protocol is configured. For more information on static and dynamic routing for NSX Edge refer to the NSX Administration Guide, section Logical Router. VMware would like to thank Adi Sosnovich, Orna Grumberg and Gabi Nakibly for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4920 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply patch Workaround =========== ======= ======= ======== ============= ========== NSX-V Edge 6.3.x any Important 6.3.3 N/A NSX-V Edge 6.2.x any Important 6.2.8 N/A 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware NSX-V Downloads: https://www.vmware.com/go/download-nsx-vsphere Documentation: https://www.vmware.com/support/pubs/nsx_pubs.html 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4920 NSX Administration Guide, section Logical Router. https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2 FGUID-885CE12B-43BF-4259-9DE5-9A7CD9EA5104.html - --------------------------------------------------------------------- 6. Change log 2017-08-10 VMSA-2017-0014 Initial security advisory in conjunction with the release of NSX-V 6.3.3 on 2017-08-10. - ---------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735 VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2017 VMware Inc. All rights reserved. ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================