First published: Mon May 09 2011(Updated: )
The self-extracting installer in the vSphere Client Installer package in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, VMware ESXi 4.x before 4.1 Update 1, and VMware ESX 4.x before 4.1 Update 1 does not have a digital signature, which might make it easier for remote attackers to spoof the software distribution via a Trojan horse installer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter | =4.0-update_1 | |
VMware vCenter | =4.1 | |
VMware vCenter | =4.0 | |
VMware vCenter | =4.0-update_2 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESX | =4.1 | |
VMware ESX | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1789 has been identified as a medium severity vulnerability due to the lack of a digital signature in the installer.
To mitigate CVE-2011-1789, it is recommended to update VMware vCenter, ESXi, and ESX products to the latest versions that contain the security fixes.
CVE-2011-1789 affects VMware vCenter versions 4.0 and 4.1 prior to their respective updates, as well as VMware ESXi and ESX versions 4.0 and 4.1 before Update 1.
CVE-2011-1789 can potentially allow remote attackers to spoof or substitute malicious installers due to the lack of digital signatures.
Administrators should prioritize addressing CVE-2011-1789 on VMware vCenter 4.0, 4.1, ESXi 4.x, and ESX 4.x installations prior to Update 1.