• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Virtualization.com

Virtualization.com

News and insights from the vibrant world of virtualization and cloud computing

  • News
  • Featured
  • Partnerships
  • People
  • Acquisitions
  • Guest Posts
  • Interviews
  • Videos
  • Funding

VMware Hosted Products and Patches for ESX and ESXi: Critical Security Issues Resolved, bzip2 Updated

January 2, 2009 by Robin Wauters Leave a Comment

VMware Hosted products and patches for ESX and ESXi resolve two security issues. The first is a critical memory corruption vulnerability in virtual device hardware. The second is an updated bzip2 package for the Service Console. (via VMblog)

a. A memory corruption condition may occur in the virtual machine hardware. A malicious request sent from the guest operating system to the virtual hardware may cause the virtual hardware to write to uncontrolled physical memory. VMware would like to thank Andrew Honig of the Department of Defense for reporting this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-4917 to this issue.

The following lists what action remediates the vulnerability if a solution is available.

Workstation 6.0.x  replace with 6.5.0 build 118166 or later

Workstation 5.x replace with 5.5.9 build 126128 or later

Player 2.0.x replace with 2.5.0 build 118166 or later

Player 1.x replace with 1.0.9 build 126128 or later

ACE 2.0.x on Windows replace with 2.5.0 build 118166 or later

ACE 1.x on Windows replace with 1.0.8 build 125922 or later

Server 1.x replace with 1.0.8 build 126538 or later

Fusion 1.x on Mac OS/X upgrade to Fusion 2.0 or later

ESXi 3.5 update with ESXe350-200811401-O-SG

ESX 3.5 update with ESX350-200811401-SG

ESX 3.0.3 update with ESX303-200811401-BG

ESX 3.0.2 update with ESX-1006980

b. Updated Service Console package bzip2

bzip2 versions before 1.0.5 can crash if certain flaws in compressed data lead to reading beyond the end of a buffer. This might cause an application linked to the libbz2 library to crash when decompressing malformed archives.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2008-1372 to this issue.

The following lists what action remediates the vulnerability if a solution is available.

ESX 3.5 update to ESX350-200811406-SG

ESX 3.0.3 update to ESX303-200811404-SG

ESX 3.0.2 update to ESX-1006982

ESX 2.5.5 update to ESX 2.5.5 Upgrade Patch 11

Solution

Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.

VMware Workstation 5.5.9

http://www.vmware.com/download/ws/ws5.html

Release notes:

http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Windows binary:

md5sum: 509c7b323a8ac42c0a92b0a1446bb0f8

Compressed Tar archive for 32-bit Linux

md5sum: 9d189e72f8111e44b27f1ee92edf265e

Linux RPM version for 32-bit Linux

md5sum: 0957c5258d033d0107517df64bfea240

VMware Player 1.0.9

—

http://www.vmware.com/download/player/

Release notes Player 1.x:

http://www.vmware.com/support/player/doc/releasenotes_player.html

Windows binary

md5sum: e2c8dd7b27df7d348f14f69de017b93f

Player 1.0.9 for Linux (.rpm)

md5sum: 471c3881fa60b058b1dac1d3c9c32c85

Player 1.0.9 for Linux (.tar)

md5sum: bef507811698e7333f5e8cb672530dbf

VMware Server 1.0.8

–

http://www.vmware.com/download/server/

Release notes:

http://www.vmware.com/support/server/doc/releasenotes_server.html

VMware Server for Windows 32-bit and 64-bit

md5sum: 4ba41e5fa192f786121a7395ebaa8d7c

VMware Server Windows client package

md5sum: f25746e275ca00f28d44ad372fc92536

VMware Server for Linux

md5sum: a476d3953ab1ff8457735e692fa5edf9

VMware Server for Linux rpm

md5sum: af6890506618fa82928fbfba8a5f97e1

Management Interface

md5sum: 5982b84a39479cabce63e12ab664d369

VMware Server Linux client package

md5sum: 605d7db48f63211cc3f5ddb2b3f915a6

ESXi

–

ESXi 3.5 patch ESXe350-200811401-O-SG

http://download3.vmware.com/software/vi/ESXe350-200811401-O-SG.zip

md5sum: e895c8cb0d32b722d7820d0214416092

http://kb.vmware.com/kb/1007507

NOTE: The three ESXi patches for Firmware “I”, VMware Tools “T,” and

the VI Client “C” are contained in a single offline “O”

download file.

ESX

ESX 3.5 patch ESX350-200811401-SG (memory corruption)

http://download3.vmware.com/software/vi/ESX350-200811401-SG.zip

md5sum: 988042ce20ce2381216fbe1862c3e66d

http://kb.vmware.com/kb/1007501

ESX 3.5 patch ESX350-200811406-SG (bzip2)

http://download3.vmware.com/software/vi/ESX350-200811406-SG.zip

md5sum: 285ec405ac34a196cbb796922e22cca2

http://kb.vmware.com/kb/1007504

ESX 3.0.3 patch ESX303-200811401-BG (memory corruption)

http://download3.vmware.com/software/vi/ESX303-200811401-BG.zip

md5sum: 26bf687a3483951d1f14ab66edf1d196

http://kb.vmware.com/kb/1006986

ESX 3.0.3 patch ESX303-200811404-SG (bzip2)

http://download3.vmware.com/software/vi/ESX303-200811404-SG.zip

md5sum: 2707e4a599867b0444e85a75a471ed4f

http://kb.vmware.com/kb/1007198

ESX 3.0.2 patch ESX-1006980 (memory corruption)

http://download3.vmware.com/software/vi/ESX-1006980.tgz

md5sum: 5e73f1585fea3ee770b2df2b94e73ca4

http://kb.vmware.com/kb/1006980

ESX 3.0.2 patch ESX-1006982 (bzip2)

http://download3.vmware.com/software/vi/ESX-1006982.tgz

md5sum: 4921cf542b5979bd0eef7f2c15683b71

http://kb.vmware.com/kb/1006982

ESX 2.5.5 patch 11 build 126598

http://download3.vmware.com/software/esx/esx-2.5.5-126598-upgrade.tar.gz

md5sum: 8d1d84c433c474334639ed22bd9d1d2a

http://vmware.com/support/esx25/doc/esx-255-200810-patch.html

Filed Under: News

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Tags

acquisition application virtualization Cisco citrix Citrix Systems citrix xenserver cloud computing Dell desktop virtualization EMC financing Funding Hewlett Packard HP Hyper-V IBM industry moves intel interview kvm linux microsoft Microsoft Hyper-V Novell oracle Parallels red hat research server virtualization sun sun microsystems VDI video virtual desktop Virtual Iron virtualisation virtualization vmware VMware ESX VMWorld VMWorld 2008 VMWorld Europe 2008 Xen xenserver xensource

Recent Comments

  • C program on Red Hat Launches Virtual Storage Appliance For Amazon Web Services
  • Hamzaoui on $500 Million For XenSource, Where Did All The Money Go?
  • vijay kumar on NComputing Debuts X350
  • Samar on VMware / SpringSource Acquires GemStone Systems
  • Meo on Cisco, Citrix Join Forces To Deliver Rich Media-Enabled Virtual Desktops

Copyright © 2025 · Genesis Sample on Genesis Framework · WordPress · Log in

  • Newsletter
  • Advertise
  • Contact
  • About