Lucian Constantin
CSO Senior Writer

VMware promises Heartbleed patches for affected products by the weekend

news
Apr 15, 20142 mins

The company has identified over two dozen affected product versions so far and is releasing updates

VMware started patching its products against the critical Heartbleed flaw that puts encrypted communications at risk, and plans to have updates ready for all affected products by Saturday.

The company’s first Heartbleed patches were released Monday and are available for Horizon Workspace Server, its application management and virtualization software. The OpenSSL library used in the product has been updated to version 1.0.1g, which resolves the Heartbleed issue, the company said in a security advisory.

[ Also on InfoWorld: Users, admins, developers: Here’s what to do about Heartbleed. |  InfoWorld’s expert contributors show you how to secure your Web browsers in a free PDF guide. Download it today! | Learn how to protect your systems with Roger Grimes’ Security Adviser blog and Security Central newsletter, both from InfoWorld. ]

Users of Horizon Workspace Server 1.0 are advised to upgrade to version 1.5 and then apply the horizon-nginx-rpm-1.5.0.0-1736237.x86_64 patch. Users of Horizon Workspace Server 1.5 should also install the aforementioned patch, while users of Horizon Workspace Server 1.8 should update to horizon-nginx-rpm-1.8.1.1810-1736201.x86_64.

Other software from the Horizon product line, like the Horizon Workspace Client for Windows and Mac OSX and the Horizon View Client for Windows, Android and iOS, is also affected, but has yet to be patched.

VMware also identified many non-Horizon products that use OpenSSL 1.0.1 and are therefore vulnerable to Heartbleed. These include: ESXi 5.5, NSX-MH 4.x, NSX-V 6.0.x, NVP 3.x, vCenter Server 5.5, VMware Fusion 6.0.x VMware OVF Tool 3.5.0, VMware vCloud Automation Center (vCAC) 6.x, VMware vCloud Networking and Security (vCNS) 5.1.3 and VMware vCloud Networking and Security (vCNS) 5.5.1.

Patches for vFabric Web Server 5.0.x — 5.3.x have been provided separately by GoPivotal, a joint venture between VMware and EMC that now controls the product.

VMware has published a knowledge base article that lists the affected products identified so far and said that it expects to have patches ready for them by Saturday. The related security advisory will continue be updated as those patches are released.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author