Mark Jones, VCI, continues his overview of the VMware vCloud Security components found in the VMware vCloud Networking and Security product suite, taking a c…
Mark Jones, VCI, provides an overview of VMware vCloud Security Components found in the VMware vCloud Networking and Security product suite, then exams the c…
http://bit.ly/QNNgGy — Configure the vCloud Networking and Security Edge Gateway in a vCloud Director Environment. Learn about the new vCloud Suite: http://…
Mark Jones, VCI, provides an overview of VMware vCloud Networking and Security Suite and the challenges it’s designed to address, including limitations in le…
Important: Ensure that you are using OpenSSL version 0.9.8. If you do not use this version, the SSL implementation will fail.To setup OpenSSL:
- Ensure that the Microsoft Visual C++ 2008 Redistributable Package (x86) is installed on the system on which you want to generate the requests. To download the package, see the Microsoft Download Center.
- Download the Shining Light Productions installer for OpenSSL x86 version 0.98r or later at http://www.slproweb.com/products/Win32OpenSSL.html. This is a software developed from the OpenSSL Project.
- Launch the installer and proceed through the installation and note the appropriate directory for later use. By default, it is located at c:\OpenSSL-Win32.After this program is installed, you must configure it to issue vSphere certificates.Note: The preceding links were correct as of July 29, 2013. If you find a link is broken, provide feedback and a VMware employee will update the link.
- Take a backup of the openssl.cfg file. By default, this file is located at the c:\OpenSSL-Win32\bin directory.
- Delete the contents of the file and replace with:Note: Replace the code in Red with the details of the server that you are configuring.[ req ]
default_bits = 2048
default_keyfile = rui.key
distinguished_name = req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = DNS:vc50, IP:10.0.0.10, DNS:vc50.vmware.com[ req_distinguished_name ]
countryName = US
stateOrProvinceName = NY
localityName = New York
0.organizationName = VMWare
organizationalUnitName = vCenterInventoryService
commonName = vc50.vmware.com
- Save and close the file.The installation is now set to configure a certificate for the server that you have entered in the file. You can repeat this configuration by creating separate files for each server request or by not specifying a value. If you do not specify a value, OpenSSL prompts you for the information.Note: The preceding modified file will not prompt you for information because all information is configured within the file.
Today VMware has released the following new security advisory:
The advisory documents CVE-2013-5973 “VMware ESXi and ESX unauthorized file access through vCenter Server and ESX”. This issue may allow certain unprivileged users on vCenter Server access to arbitrary files on ESXi/ESX and may allow local unprivileged users on ESX (i.e. ESX 4.0 and ESX 4.1) access to arbitrary files. Modification of files on ESXi or ESX may allow for code execution after a host reboot.
Please sign up to the Security-Announce mailing list to receive new and updated VMware Security Advisories.
Customers should review the security advisory and direct any questions to VMware Support.
VMware Security Advisories
VMware ESXi 5.5 without patch ESXi550-201312001
VMware ESXi 5.1 without patch ESXi510-201310001
VMware ESXi 5.0 without patch update-from-esxi5.0-5.0_update03
VMware ESXi 4.1 without patch ESXi410-201312001
VMware ESXi 4.0 without patch ESXi400-201310001
VMware ESX 4.1 without patch ESX410-201312001
VMware ESX 4.0 without patch ESX400-201310001
VMware ESXi and ESX contain a vulnerability in the handling of certain Virtual Machine file descriptors. This issue may allow an unprivileged vCenter Server user with the privilege “Add Existing Disk” to obtain read and write access to arbitrary files on ESXi or ESX. On ESX, an unprivileged local user may obtain read and write access to arbitrary files. Modifying certain files may allow for code execution after a host reboot.
Unpriviledged vCenter Server users or groups that are assigned the predefined role “Virtual Machine Power User” or “Resource Pool Administrator” have the privilege “Add Existing Disk”.
The issue cannot be exploited through VMware vCloud Director.
- A workaround is provided in VMware Knowledge Base article 2066856.
- In a default vCenter Server installation no unprivileged users or groups are assigned the predefined role “Virtual Machine Power User” or “Resource Pool Administrator”.
- Restrict the number of vCenter Server users that have the privilege “Add Existing Disk”.
VMware would like to thank Shanon Olsson for reporting this issue to us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-5973 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Known Issues (*)
Deploying these patches does not remediate the issue if the ESXi or ESX file /etc/vmware/configrules has been modified manually (modifying this file is uncommon). Customers who have modified this file should apply the workaround after installing the patch.
After deploying the patches, Virtual Machines that have their names ending in “-flat”, “-rdm” or “-rdmp” will no longer power on. See the VMware Knowledge Base article listed under “Workaround” for a solution.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
ESXi and ESX
ESXi550-201312001 contains ESXi550-201312101-SG
ESXi510-201310001 contains ESXi510-201310101-SG
update-from-esxi5.0-5.0_update03 contains ESXi500-201310101-SG
ESXi410-201312001 contains ESXi410-201312401-SG
ESXi400-201310001 contains ESXi400-201310401-SG
ESX410-201312001 contains ESX410-201312401-SG
ESX400-201310001 contains ESX400-201310401-SG
VMware Knowledge Base article KB2066856
Initial security advisory in conjunction with the release of ESXi 5.5 patches on 2013-12-22
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
* security-announce at lists.vmware.com
* bugtraq at securityfocus.com
* full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
VMware security response policy
General support life cycle policy
VMware Infrastructure support life cycle policy
vSphere 5.5 Update 1
vSphere 5.0 and earlier
- vSphere 5.0 Security Hardering Guide
- vSphere 4.1 Security Hardering Guide
- vSphere 4.0 Security Hardering Guides
Other VMware Products
- NSX-v v1.6 – Security Hardening Guide
- vRealize Configuration Manager 5.5
- vRealize Automation
- vRealize Operations Manager
The VMware® vCloud™ Director Security Hardening Guide helps users who are embarking into the journey of cloud computing understand key security elements and technologies found in VMware’s vCloud Director product. It also provides guidelines and best practices for installation, configuration and operation of secure clouds based on VMware’s vCloud Director.
Sep 10, 2010
vCloud Director Security Hardening Guide Technical White Paper