Vulnerabilities Reported for VMware ESX Server

analysis
Jan 14, 20071 min

Danish vulnerability assessment clearinghouse, Secunia, has released advisory SA23680 which states that there are multiple vulnerabilities found within VMware ESX Server that affects both VMware ESX Server 2.x and 3.x. Marked as highly critical, Secunia states that vulnerabilities have been reported in VMware ESX Server which can be exploited by malicious people to gain knowledge of sensitive information, bypass

Danish vulnerability assessment clearinghouse, Secunia, has released advisory SA23680 which states that there are multiple vulnerabilities found within VMware ESX Server that affects both VMware ESX Server 2.x and 3.x.

Marked as highly critical, Secunia states that vulnerabilities have been reported in VMware ESX Server which can be exploited by malicious people to gain knowledge of sensitive information, bypass certain security restrictions, cause a DoS (denial of service), gain escalated privileges, or compromise a system.

The solution is to provide the following patches:

  • ESX 3.0.1 – Apply patch ESX 3.0.1 Patch ESX-9986131.

  • ESX 3.0.0 – Apply patch ESX 3.0.0 Patch ESX-3069097.

  • ESX 2.5.4 – Apply ESX 2.5.4 Upgrade Patch 3 (Build# 36502)

  • ESX 2.5.3 – Apply ESX 2.5.3 Upgrade Patch 6 (Build# 35703)

  • ESX 2.1.3 – Apply ESX 2.1.3 Upgrade Patch 4 (Build# 35803)

  • ESX 2.0.2 – Apply ESX 2.0.2 Upgrade Patch 4 (Build# 35801)

For more information, visit the following original advisories:

VI3 – ESX Patch 9986131

VI3 – ESX Patch 3069097

ESX 2.5.4 – ESX Patch 200612

ESX 2.5.3 – ESX Patch 200612

ESX 2.1.3 – ESX Patch 200612

ESX 2.0.2 – ESX Patch 200612