VMware Tanzu products update for Rsyslog



Published: 2022-08-01
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2018-16881
CVE-2019-17041
CVE-2019-17042
CWE-ID CWE-20
CWE-119
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
VMware Tanzu Application Service for VMs
Server applications / Other server solutions

Isolation Segment
Server applications / Other server solutions

Vendor VMware, Inc

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU17698

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-16881

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists in the imptcp module due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted message to the imptcp socket that submits malicious input and cause the affected software to crash, resulting in a DoS condition.

Mitigation

Install update from vendor's website:

  • Isolation Segment
    • 2.7.x: Upgrade Xenial Stemcells to 456.1 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.5 or greater
  • VMware Tanzu Application Service for VMs
    • 2.7.x: Upgrade Xenial Stemcells to 456.1 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.5 or greater

Vulnerable software versions

VMware Tanzu Application Service for VMs: All versions

Isolation Segment: All versions

External links

http://tanzu.vmware.com/security/usn-5419-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Buffer overflow

EUVDB-ID: #VU22770

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17041

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in "contrib/pmaixforwardedfrom/pmaixforwardedfrom.c" due to a boundary error in the parser for AIX log messages. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website:

  • Isolation Segment
    • 2.7.x: Upgrade Xenial Stemcells to 456.1 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.5 or greater
  • VMware Tanzu Application Service for VMs
    • 2.7.x: Upgrade Xenial Stemcells to 456.1 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.5 or greater

Vulnerable software versions

VMware Tanzu Application Service for VMs: All versions

Isolation Segment: All versions

External links

http://tanzu.vmware.com/security/usn-5419-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU22771

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-17042

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in "contrib/pmcisconames/pmcisconames.c" due to a boundary error in the parser for Cisco log messages. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website:

  • Isolation Segment
    • 2.7.x: Upgrade Xenial Stemcells to 456.1 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.5 or greater
  • VMware Tanzu Application Service for VMs
    • 2.7.x: Upgrade Xenial Stemcells to 456.1 or greater
    • 2.8.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.9.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.10.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.11.x: Upgrade Xenial Stemcells to 621.5 or greater
    • 2.12.x: Upgrade Xenial Stemcells to 621.5 or greater

Vulnerable software versions

VMware Tanzu Application Service for VMs: All versions

Isolation Segment: All versions

External links

http://tanzu.vmware.com/security/usn-5419-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###