Security Advisor

VMware Issues Security Update for DoS Flaw

The vulnerability only affects client-side users.

Virtualization vendor VMware released a patch earlier this month to repair a denial-of-service (DOS) issue in its vSphere API.

The flaw, if taken advantage of by attackers, could stop a host from accessing the Web service.

"This issue allows an unauthenticated user to send a maliciously crafted API request and disable the host daemon," wrote VMware in a security advisory. "Exploitation of the issue would prevent management activities on the host but any virtual machines running on the host would be unaffected."

According to VMware, the update should be applied to VMware ESXi 4.1 without patch ESXi410-201211401-SG, VMware ESX 4.1 without patches ESX410-201211401-SG, ESX410-201211402-SG, ESX410-201211405-SG and ESX410-201211407-SG.

The update, which was made available on Nov. 15, doesn't appear to be related to a leaked code issue that VMware warned the public about earlier in the month:

"Today, Nov. 4, 2012, our security team became aware of the public posting of VMware ESX source code dating back to 2004," wrote VMware in a blog post. "This source code is related to the source code posted publicly on April 23, 2012. It is possible that more related files will be posted in the future. We take customer security seriously and have engaged our VMware Security Response Center to thoroughly investigate."

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

comments powered by Disqus

Reader Comments:

Add Your Comment Now:

Your Name:(optional)
Your Email:(optional)
Your Location:(optional)
Comment:
Please type the letters/numbers you see above

Redmond Tech Watch

Sign up for our newsletter.

I agree to this site's Privacy Policy.