VMSA-2023-0014

vmware logo header

Important


VMSA-2023-0014

5.9 – 8.1

2023-06-22

2023-06-22 (Initial Advisory)

CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896

VMware vCenter Server updates address multiple memory corruption vulnerabilities (CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896)

1. Impacted Products



  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)

2. Introduction



Multiple memory corruption vulnerabilities in VMware vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

3a. VMware vCenter Server heap-overflow vulnerability (CVE-2023-20892)



Description:
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

Resolution:
To remediate CVE-2023-20892 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Aleksandar Nikolic of Cisco for reporting this issue to us.

Notes:
None.

3b. VMware vCenter Server use-after-free vulnerability (CVE-2023-20893)

Description:
The vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

Resolution:
To remediate CVE-2023-20893 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.

Notes:
None.

3c. VMware vCenter Server out-of-bounds write vulnerability (CVE-2023-20894)

Description:
The vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.

Resolution:
To remediate CVE-2023-20894 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.

Notes:
None.

3d. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20895)

Description:
The vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.

Resolution:
To remediate CVE-2023-20895 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis of Cisco Talos for reporting this issue to us.

Notes:
None.

3e. VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20896)

Description:
The vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).

Resolution:
To remediate CVE-2023-20896 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds:
None.

Additional Documentation:
Async patches for vCenter Servers have been made available for VCF customers. Please see knowledge base article 88287 for more information.
A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0014-qna.

Acknowledgments:
VMware would like to thank Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos for reporting this issue to us.

Notes:
None.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
vCenter Server
8.0
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
None
vCenter Server
8.0
Any
CVE-2023-20896
None
None
vCenter Server
7.0
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
None
vCenter Server
7.0
Any
CVE-2023-20896
None
None
Cloud Foundation (vCenter Server)
5.x
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
Cloud Foundation (vCenter Server)
5.x
Any
CVE-2023-20896
None
Cloud Foundation (vCenter Server)
4.x
Any
CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895
None
Cloud Foundation (vCenter Server)
4.x
Any
CVE-2023-20896
None

4. References

5. Change Log



2023-06-22 VMSA-2023-0014
Initial security advisory.

6. Contact



E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC

 

Copyright 2023 VMware Inc. All rights reserved.
 

Read full article (vmware.com)

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Leave a Reply
Previous Post
citrix logo header

How to Set the Time Zone of the NetScaler Appliance to UTC Time Zone

Next Post
citrix logo header

Session Recording Agent Installaltion Failure due to Error “Cannot Load Counter Name Data”

Related Posts